CVE-2019-18679 – squid: Information Disclosure issue in HTTP Digest Authentication
https://notcve.org/view.php?id=CVE-2019-18679
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks. Se descubrió un problema en Squid versiones 2.x, 3.x y versiones 4.x hasta 4.8. • http://www.squid-cache.org/Advisories/SQUID-2019_11.txt http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch https://bugzilla.suse.com/show_bug.cgi?id=1156324 https://github.com/squid-cache/squid/pull/491 https://lists.debian.org/debian-lts-announce/2019/12/msg00011.html https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTM74TU2BSLT5B3H4F3UDW5367 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-4350 – Yaws Web Server Directory Traversal
https://notcve.org/view.php?id=CVE-2011-4350
Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request. Yaws versión 1.91, presenta una vulnerabilidad de salto de directorio en la manera en que ciertas URL son procesadas. Un usuario autenticado remoto podría usar este fallo para obtener contenido de archivos locales arbitrarios mediante una petición de URL especialmente diseñada. • https://access.redhat.com/security/cve/cve-2011-4350 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650009 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4350 https://security-tracker.debian.org/tracker/CVE-2011-4350 https://www.openwall.com/lists/oss-security/2011/11/25/7 https://bugzilla.redhat.com/show_bug.cgi?id=757181 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2011-4120
https://notcve.org/view.php?id=CVE-2011-4120
Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question by providing a NULL value (pressing Ctrl-D keyboard sequence) as the password string. El módulo PAM de Yubico versiones anteriores a 2.10, realizó la autenticación del usuario cuando no se utilizó la opción de configuración PAM "use_first_pass" y el módulo fue configurado como "sufficient" en la configuración PAM. Un atacante remoto podría usar este fallo para omitir el proceso de autenticación común y conseguir acceso a la cuenta en cuestión al proporcionar un valor NULL (presionando la secuencia de teclado Ctrl-D) como la cadena de contraseña. • https://access.redhat.com/security/cve/cve-2011-4120 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4120 https://security-tracker.debian.org/tracker/CVE-2011-4120 https://www.openwall.com/lists/oss-security/2011/11/07/6 • CWE-20: Improper Input Validation •
CVE-2011-4082
https://notcve.org/view.php?id=CVE-2011-4082
A local file inclusion flaw was found in the way the phpLDAPadmin before 0.9.8 processed certain values of the "Accept-Language" HTTP header. A remote attacker could use this flaw to cause a denial of service via specially-crafted request. Se encontró un fallo de inclusión de archivo local en la manera en que phpLDAPadmin versiones anteriores a 0.9.8 procesó determinados valores del encabezado HTTP "Accept-Language". Un atacante remoto podría usar este fallo para causar una denegación de servicio por medio de una petición especialmente diseñada. • https://access.redhat.com/security/cve/cve-2011-4082 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4082 https://security-tracker.debian.org/tracker/CVE-2011-4082 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-3632
https://notcve.org/view.php?id=CVE-2011-3632
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks. Hardlink versiones anteriores a 0.1.2, opera en nombres de ruta de objetos del sistema de archivos completo, lo que puede permitir a un atacante local usar este fallo para realizar ataques de tipo symlink. • https://access.redhat.com/security/cve/cve-2011-3632 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=645516 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3632 https://security-tracker.debian.org/tracker/CVE-2011-3632 https://www.openwall.com/lists/oss-security/2011/10/15/2 https://www.openwall.com/lists/oss-security/2011/10/20/6 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •