46 results (0.017 seconds)

CVSS: 3.8EPSS: 2%CPEs: 56EXPL: 0

Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow. Desbordamiento de entero en la función FontFileInitTable en X.Org libXfont versiones anteriores a 20070403 permite a usuarios remotos autenticados ejecutar código de su elección mediante una primera línea larga en el fichero fonts.dir, lo cual resulta en un desbordamiento de montón. • http://issues.foresightlinux.org/browse/FL-223 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html http://rhn.redhat.com/errata/RHSA-2007-0125.html http://secunia.com/advisories/24741 http://secunia.com/advisories/24745 http://secunia.com/advisories/ •

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver. pam_ldap en nss_ldap sobre Red Hat Enterprise Linux 4, Fedora Core 3 y anteriores, y posiblemente otras distribuciones no devuelven una condición de error cuando un servidor de directorio LDAP responde con una respuesta de control PasswordPolicyResponse, lo cual provoca que la función pam_authenticate devuelva código correcto aunque haya fallado, según lo divulgado originalmente para el xscreensaver. • http://bugzilla.padl.com/show_bug.cgi?id=291 http://rhn.redhat.com/errata/RHSA-2006-0719.html http://secunia.com/advisories/22682 http://secunia.com/advisories/22685 http://secunia.com/advisories/22694 http://secunia.com/advisories/22696 http://secunia.com/advisories/22869 http://secunia.com/advisories/23132 http://secunia.com/advisories/23428 http://security.gentoo.org/glsa/glsa-200612-19.xml http://securitytracker.com/id?1017153 http://www.debian.org/security/2006 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Multiple memory leaks in the LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (memory consumption) via invalid BER packets that trigger an error, which might prevent memory from being freed if it was allocated during the ber_scanf call, as demonstrated using the ProtoVer LDAP test suite. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135 http://secunia.com/advisories/18960 http://www.securityfocus.com/bid/16677 https://exchange.xforce.ibmcloud.com/vulnerabilities/24794 https://access.redhat.com/security/cve/CVE-2006-0451 https://bugzilla.redhat.com/show_bug.cgi?id=179135 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

The LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (crash) via a certain "bad BER sequence" that results in a free of uninitialized memory, as demonstrated using the ProtoVer LDAP test suite. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135 http://secunia.com/advisories/18960 http://www.securityfocus.com/bid/16677 https://exchange.xforce.ibmcloud.com/vulnerabilities/24795 https://access.redhat.com/security/cve/CVE-2006-0453 https://bugzilla.redhat.com/show_bug.cgi?id=1617999 •