5 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 1

dne2000.sys in Citrix Deterministic Network Enhancer (DNE) 2.21.7.233 through 3.21.7.17464, as used in (1) Cisco VPN Client, (2) Blue Coat WinProxy, and (3) SafeNet SoftRemote and HighAssurance Remote, allows local users to gain privileges via a crafted DNE_IOCTL DeviceIoControl request to the \\.\DNE device interface. dne2000.sys en Citrix Deterministic Network Enhancer (DNE) desde la version 2.21.7.233 a la 3.21.7.17464, tal y como se usa en (1) Cisco VPN Client, (2) Blue Coat WinProxy, y (3) SafeNet SoftRemote y HighAssurance Remote, permite a usuarios locales obtener privilegios a través de una petición DNE_IOCTL DeviceIoControl modificada a la interfaz de dispositivo \\.\DNE . • https://www.exploit-db.com/exploits/5837 http://secunia.com/advisories/30728 http://secunia.com/advisories/30744 http://secunia.com/advisories/30747 http://secunia.com/advisories/30753 http://securityreason.com/securityalert/4600 http://support.citrix.com/article/CTX117751 http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCsm25860 http://www.digit-labs.org/files/exploits/dne2000-call.c http://www.kb.cert.org/vuls/id/858993 http://www&# • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request. IPSecDrv.sys 10.4.0.12 en SafeNET HighAssurance Remote y SoftRemote. Permite a usuarios locales ganar privilegios a través de peticiones IPSECDRV_IOCTL IOCTL manipuladas. • https://www.exploit-db.com/exploits/5004 http://secunia.com/advisories/28701 http://www.securityfocus.com/bid/27496 http://www.securitytracker.com/id?1019282 http://www.vupen.com/english/advisories/2008/0333 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 8%CPEs: 2EXPL: 4

IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec. IPSecDrv.sys 10.4.0.12 en SafeNET High Assurance Remote 1.4.0 Build 12, y SoftRemote, permiet a atacantes remotos provocar denegación de servicio (bucle infinito y cuelgue del sistema)a través de paquetes no válidos con ciertos bytes en una cabecera opciones, posiblemente relacionado con el soporte de IPv6 para IPSec. • https://www.exploit-db.com/exploits/4047 http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063859.html http://osvdb.org/37137 http://secunia.com/advisories/25574 http://securityreason.com/securityalert/2803 http://www.digit-labs.org/files/exploits/safenet-dos.c http://www.securityfocus.com/bid/24385 https://exchange.xforce.ibmcloud.com/vulnerabilities/34775 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process. • http://marc.info/?l=bugtraq&m=110791865522076&w=2 http://securitytracker.com/id?1013134 http://www.nta-monitor.com/news/vpn-flaws/safenet/index.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/19256 •

CVSS: 5.1EPSS: 1%CPEs: 1EXPL: 0

SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload. • http://www.kb.cert.org/vuls/id/287771 http://www.kb.cert.org/vuls/id/AAMN-59VTUQ http://www.safenet-inc.com/knowledgebase/read_item.asp?ID=375 •