2 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. nse_libssh2.cc en Nmap 7.70 está sujeto a una condición de denegación de servicio debido a una doble liberación cuando se produce un error en una conexión SSH, como lo demuestra un carácter principal de .n a ssh-brute.nse o ssh-auth-methods.nse. • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad https://github.com/nmap/nmap/issues/1077 https://github.com/nmap/nmap/issues/1227 https://seclists.org/nmap-announce/2019/0 https://seclists.org/nmap-dev/2018/q2/45 • CWE-415: Double Free •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service. Nmap hasta la versión 7.70, cuando se emplea la opción -sV, permite que atacantes remotos provoquen una denegación de servicio (consumo de pila y cierre inesperado de la aplicación) mediante un servicio manipulado basado en TCP. • http://code610.blogspot.com/2018/07/crashing-nmap-760.html http://code610.blogspot.com/2018/07/crashing-nmap-770.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00067.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html https://security.netapp.com/advisory/ntap-20200827-0004 •