8 results (0.006 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

PADL MigrationTools 46 creates temporary files insecurely, which allows local users to overwrite arbitrary files via a symlink attack on the temporary files, which are not properly created by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh. PADL MigrationTools 46 crea archivos temporales de forma insegura, lo que permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico en los archivos temporales, que no son creados adecuadamente por (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh y (8) migrate_all_nisplus_offline.sh. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920 http://secunia.com/advisories/22243 http://www.vupen.com/english/advisories/2005/2427 https://www.debian.org/security/2006/dsa-1187 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

PADL MigrationTools 46, when a failure occurs, stores contents of /etc/shadow in a world-readable /tmp/nis.$$.ldif file, and possibly other sensitive information in other temporary files, which are not properly managed by (1) migrate_all_online.sh, (2) migrate_all_offline.sh, (3) migrate_all_netinfo_online.sh, (4) migrate_all_netinfo_offline.sh, (5) migrate_all_nis_online.sh, (6) migrate_all_nis_offline.sh, (7) migrate_all_nisplus_online.sh, and (8) migrate_all_nisplus_offline.sh. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920 http://secunia.com/advisories/17530 http://www.osvdb.org/20839 http://www.vupen.com/english/advisories/2005/2427 https://exchange.xforce.ibmcloud.com/vulnerabilities/42335 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Unknown vulnerability in pam_ldap before 180 does not properly handle a new password policy control, which could allow attackers to gain privileges. NOTE: CVE-2005-2497 had also been assigned to this issue, but CVE-2005-2641 is the correct candidate. • http://secunia.com/advisories/17233 http://secunia.com/advisories/17270 http://www.kb.cert.org/vuls/id/778916 http://www.mandriva.com/security/advisories?name=MDKSA-2005:190 http://www.redhat.com/support/errata/RHSA-2005-767.html http://www.securityfocus.com/archive/1/447859/100/200/threaded http://www.securityfocus.com/bid/14649 https://issues.rpath.com/browse/RPL-680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10370 https://w •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the pam_filter mechanism in pam_ldap before version 162, when LDAP based authentication is being used, allows users to bypass host-based access restrictions and log onto the system. • http://www.mandriva.com/security/advisories?name=MDKSA-2003:088 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in the DNS SRV code for nss_ldap before nss_ldap-198 allows remote attackers to cause a denial of service and possibly execute arbitrary code. • http://www.padl.com/Articles/PotentialBufferOverflowin.html https://access.redhat.com/security/cve/CVE-2002-0825 https://bugzilla.redhat.com/show_bug.cgi?id=1616816 •