CVE-2011-3336 – Libc - 'regcomp()' Stack Exhaustion Denial of Service
https://notcve.org/view.php?id=CVE-2011-3336
regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion. regcomp en la implementación BSD de libc, es vulnerable a una denegación de servicio debido al agotamiento de la pila. Mac OS X, Safari, Firefox and Kaspersky all suffer from a regular expression denial of service condition that was discovered long ago in regcomp(). • https://www.exploit-db.com/exploits/36288 http://seclists.org/fulldisclosure/2014/Mar/166 http://www.securityfocus.com/bid/50541 https://cxsecurity.com/issue/WLB-2011110082 https://www.securityfocus.com/archive/1/520390 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-4062 – FreeBSD - UIPC socket heap Overflow (PoC)
https://notcve.org/view.php?id=CVE-2011-4062
Buffer overflow in the kernel in FreeBSD 7.3 through 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket. Desbordamiento de búfer en la "emulación de Linux" de apoyo en FreeBSD v7.3 y v7.4, v8.1 y v8.2, y v9 antes de v9.0-RC1 permite a usuarios locales provocar una denegación de servicio (pánico) y posiblemente ejecutar código arbitrario mediante una llamada al llamado sistema de vinculación con un largo camino para un socket UNIX-domain, que no se manipula correctamente, cuando la dirección es utilizada por otras llamadas al sistema no especificado. • https://www.exploit-db.com/exploits/17908 http://secunia.com/advisories/46202 http://secunia.com/advisories/46564 http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc http://security.freebsd.org/patches/SA-11:05/unix2.patch http://www.debian.org/security/2011/dsa-2325 http://www.exploit-db.com/exploits/17908 http://www.osvdb.org/75788 http://www.securityfocus.com/bid/49862 http://www.securitytracker.com/id?1026106 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-1739
https://notcve.org/view.php?id=CVE-2011-1739
The makemask function in mountd.c in mountd in FreeBSD 7.4 through 8.2 does not properly handle a -network field specifying a CIDR block with a prefix length that is not an integer multiple of 8, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances via an NFS mount request. La función makemask en mountd.c en mountd en FreeBSD v7.4 a v8.2 no controla correctamente el campo de una red, la especificación de un bloque CIDR con una longitud de prefijo que no es un múltiplo entero de 8, lo que permite a atacantes remotos evitar las restricciones de acceso previsto en oportunistas circunstancias a través de un montaje de petición NFS. • http://secunia.com/advisories/44307 http://security.FreeBSD.org/advisories/FreeBSD-SA-11:01.mountd.asc http://securitytracker.com/id?1025425 http://www.securityfocus.com/bid/47517 http://www.vupen.com/english/advisories/2011/1076 https://exchange.xforce.ibmcloud.com/vulnerabilities/66981 • CWE-20: Improper Input Validation •
CVE-2008-4609
https://notcve.org/view.php?id=CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. La implementación del protocolo TCP en (1) Linux, (2) plataformas basadas en BSD Unix, (3) Microsoft Windows, (4) productos Cisco, y probablemente otros sistemas operativos, permite a atacantes remotos provocar una denegación de servicio (agotamiento de cola de conexión) a través de múltiples vectores que manipulan información en la tabla de estados del TCP, como lo demuestra sockstress. • http://blog.robertlee.name/2008/10/conjecture-speculation.html http://insecure.org/stf/tcp-dos-attack-explained.html http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html http://marc.info/?l=bugtraq&m=125856010926699&w=2 http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html http://www.cpni • CWE-16: Configuration •
CVE-2002-1219
https://notcve.org/view.php?id=CVE-2002-1219
Buffer overflow in named in BIND 4 versions 4.9.10 and earlier, and 8 versions 8.3.3 and earlier, allows remote attackers to execute arbitrary code via a certain DNS server response containing SIG resource records (RR). Desbordamiento de búfer en BIND versiones 4 anteriores a 4.9.10, y versiones 8 anteriores a 8.3.3, permite a atacantes remotos ejecutar código arbitrario mediante una cierta respuesta de servidor DNS conteniendo registros de recursos (RR) SIG. • ftp://patches.sgi.com/support/free/security/advisories/20021201-01-P http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21469 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000546 http://lists.apple.com/archives/Security-announce/2002/Nov/msg00000.html http://marc.info/?l=bugtraq&m=103713117612842&w=2 http://marc.info/?l=bugtraq&m=103763574715133&w=2 http://online.securityfocus.com/advisories/4999 http://online.securityfocus.com/archive/1/300019 http: •