Page 14 of 344 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

FreeBSD: Input Validation Flaw allows local users to gain elevated privileges FreeBSD: un Fallo de Comprobación de Entrada permite a usuarios locales alcanzar privilegios elevados. • http://archives.neohapsis.com/archives/bugtraq/2012-11/0089.html http://www.securityfocus.com/bid/56654 http://www.securitytracker.com/id?1027809 https://access.redhat.com/security/cve/cve-2012-4576 https://exchange.xforce.ibmcloud.com/vulnerabilities/80321 https://security-tracker.debian.org/tracker/CVE-2012-4576 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 3

The SCTP implementation in FreeBSD 8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted ASCONF chunk. La implementación SCTP ??en FreeBSD v8.2, permite a atacantes remotos provocar una denegación de servicio (desreferencia de puntero NULL y un "kernel panic") a través de un chunk ASCONF modificado para este fin. • https://www.exploit-db.com/exploits/20226 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686962 http://www.exploit-db.com/exploits/20226 http://www.openwall.com/lists/oss-security/2012/08/28/9 http://www.openwall.com/lists/oss-security/2012/08/29/6 http://www.securityfocus.com/bid/54797 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The ipalloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD does not properly allocate memory, which makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, related to "integer rounding and overflow" errors. La función ipalloc en libc /stdlib/malloc.c en jemalloc en libc para FreeBSD y NetBSD v6.4 no asignan correctamente la memoria, lo que hace que sea más fácil para los atacantes dependientes de contexto llevar a cabo ataques relacionados con la memoria, tales como desbordamientos de búfer a través de un valor de tamaño grande, relacionado con errores de "redondeo entero y desbordamiento". • http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited http://svnweb.freebsd.org/base?view=revision&revision=167872 • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which triggers a memory allocation of one byte. • http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited http://svnweb.freebsd.org/base?view=revision&revision=161263 • CWE-189: Numeric Errors •

CVSS: 7.9EPSS: 0%CPEs: 20EXPL: 3

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier. El modo de usuario Scheduler en el núcleo en Microsoft Windows Server v2008 R2 y R2 SP1 y Windows v7 Gold y SP1 sobre la plataforma x64 no maneja adecuadamente solicitudes del sistema, lo que permite a usuarios locales obtener privilegios a través de una aplicación modificada, también conocida como "vulnerabilidad de corrupción de memoria de modo de usuario Scheduler". It was found that the Xen hypervisor implementation as shipped with Red Hat Enterprise Linux 5 did not properly restrict the syscall return addresses in the sysret return path to canonical addresses. An unprivileged user in a 64-bit para-virtualized guest, that is running on a 64-bit host that has an Intel CPU, could use this flaw to crash the host or, potentially, escalate their privileges, allowing them to execute arbitrary code at the hypervisor level. • https://www.exploit-db.com/exploits/46508 https://www.exploit-db.com/exploits/28718 https://www.exploit-db.com/exploits/20861 http://blog.illumos.org/2012/06/14/illumos-vulnerability-patched http://blog.xen.org/index.php/2012/06/13/the-intel-sysret-privilege-escalation http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2012-003.txt.asc http://lists.xen.org/archives/html/xen-announce/2012-06/msg00001.html http://lists.xen.org/archives/html/xen-devel/2012-06 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •