CVE-2007-2447
Summary
| CVE | CVE-2007-2447 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-14 21:19:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management. |
Risk And Classification
Primary CVSS: v2.0 6 from [email protected]
AV:N/AC:M/Au:S/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
SingleConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:S/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Samba | Samba | 3.0.0 | All | All | All |
| Application | Samba | Samba | 3.0.1 | All | All | All |
| Application | Samba | Samba | 3.0.10 | All | All | All |
| Application | Samba | Samba | 3.0.11 | All | All | All |
| Application | Samba | Samba | 3.0.12 | All | All | All |
| Application | Samba | Samba | 3.0.13 | All | All | All |
| Application | Samba | Samba | 3.0.14 | All | All | All |
| Application | Samba | Samba | 3.0.14a | All | All | All |
| Application | Samba | Samba | 3.0.15 | All | All | All |
| Application | Samba | Samba | 3.0.16 | All | All | All |
| Application | Samba | Samba | 3.0.17 | All | All | All |
| Application | Samba | Samba | 3.0.18 | All | All | All |
| Application | Samba | Samba | 3.0.19 | All | All | All |
| Application | Samba | Samba | 3.0.2 | All | All | All |
| Application | Samba | Samba | 3.0.20 | All | All | All |
| Application | Samba | Samba | 3.0.20a | All | All | All |
| Application | Samba | Samba | 3.0.20b | All | All | All |
| Application | Samba | Samba | 3.0.21 | All | All | All |
| Application | Samba | Samba | 3.0.21a | All | All | All |
| Application | Samba | Samba | 3.0.21b | All | All | All |
| Application | Samba | Samba | 3.0.21c | All | All | All |
| Application | Samba | Samba | 3.0.22 | All | All | All |
| Application | Samba | Samba | 3.0.23 | All | All | All |
| Application | Samba | Samba | 3.0.23a | All | All | All |
| Application | Samba | Samba | 3.0.23b | All | All | All |
| Application | Samba | Samba | 3.0.23c | All | All | All |
| Application | Samba | Samba | 3.0.23d | All | All | All |
| Application | Samba | Samba | 3.0.24 | All | All | All |
| Application | Samba | Samba | 3.0.25 | pre1 | All | All |
| Application | Samba | Samba | 3.0.25 | pre2 | All | All |
| Application | Samba | Samba | 3.0.25 | rc1 | All | All |
| Application | Samba | Samba | 3.0.25 | rc2 | All | All |
| Application | Samba | Samba | 3.0.25 | rc3 | All | All |
| Application | Samba | Samba | 3.0.2a | All | All | All |
| Application | Samba | Samba | 3.0.3 | All | All | All |
| Application | Samba | Samba | 3.0.4 | All | All | All |
| Application | Samba | Samba | 3.0.4 | rc1 | All | All |
| Application | Samba | Samba | 3.0.5 | All | All | All |
| Application | Samba | Samba | 3.0.6 | All | All | All |
| Application | Samba | Samba | 3.0.7 | All | All | All |
| Application | Samba | Samba | 3.0.8 | All | All | All |
| Application | Samba | Samba | 3.0.9 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Red Hat update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SUSE update for samba - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| APPLE-SA-2007-07-31 Security Update 2007-007 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| USN-460-1: Samba vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| www.openwall.com/lists/oss-security/2025/10/16/2 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| VMware ESX Server Multiple Security Updates - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [Full-Disclosure] Mailing List Charter | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| US-CERT Vulnerability Notes | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: samba security problems (SUSE-SA:2007:031) | af854a3a-2127-422b-91ae-364da2661108 | lists.suse.com | |
| rPath update for samba and samba-swat - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| SecurityTracker.com Archives - Samba 'smb.conf' Scripts Input Validation Flaw Lets Remote Users Inject Arbitrary Commands | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Debian -- Security Information -- DSA-1291-1 samba | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Samba 3.0.0 - 3.0.25rc3: Remote Command Injection Vulnerability - CXSecurity.com | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| Debian update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Apple Mac OS X 2007-007 Multiple Security Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| issues.rpath.com/browse/RPL-1366 | af854a3a-2127-422b-91ae-364da2661108 | issues.rpath.com | |
| Slackware update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| OpenPKG Corporation: Security: Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.openpkg.com | |
| www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf | af854a3a-2127-422b-91ae-364da2661108 | www.xerox.com | |
| HP Internet Express for Tru64 UNIX Samba Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| Gentoo update for vmware - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| About Security Update 2007-007 | af854a3a-2127-422b-91ae-364da2661108 | docs.info.apple.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Samba Multiple Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Gentoo update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Mandriva update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | slackware.com | |
| sunsolve.sun.com/search/document.do | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| Gentoo Linux Documentation -- Samba: Multiple vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| www.trustix.org/errata/2007/0017 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | |
| Samba MS-RPC Remote Shell Command Execution Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| HP Support document - HP Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20000.www2.hp.com | |
| Samba - Security Announcement Archive | af854a3a-2127-422b-91ae-364da2661108 | www.samba.org | Patch, Vendor Advisory |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Sun Solaris Multiple Samba Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| #200588: Multiple Security Vulnerabilities in samba(7) May Allow Remote Code Execution, Elevation of Privileges, Remote Shell Command Execution, or Denial of Service (DoS) | af854a3a-2127-422b-91ae-364da2661108 | sunsolve.sun.com | |
| www.osvdb.org/34700 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| Ubuntu update for samba - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| HPSBUX02218 SSRT071424 rev.1 - HP-UX running CIFS Server (Samba), Remote Arbitrary Code Execution - c01067768 - HP Business Support Center | af854a3a-2127-422b-91ae-364da2661108 | h20000.www2.hp.com | |
| labs.idefense.com/intelligence/vulnerabilities/display.php | af854a3a-2127-422b-91ae-364da2661108 | labs.idefense.com | |
| Xerox ESS/Network Controller Samba Vulnerabilities - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SUSE Update for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Trustix Updates for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.