CVE-2007-6180
https://notcve.org/view.php?id=CVE-2007-6180
Race condition in the Remote Procedure Call kernel module (rpcmod) in Sun Solaris 8 through 10 allows local users to cause a denial of service (NULL dereference and panic) via unspecified vectors. Condición de carrera en el módulo del núcleo de Llamada Procedimientos Remotos (Remote Procedure Call o rpcmod) en Sun Solaris 8 hasta 10 permite a usuarios locales provocar una denegación de servicio (referencia a NULL y panic) a través de vectores no especificados. • http://osvdb.org/40821 http://secunia.com/advisories/27831 http://secunia.com/advisories/28057 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103083-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200661-1 http://support.avaya.com/elmodocs2/security/ASA-2007-508.htm http://www.securityfocus.com/bid/26627 http://www.securitytracker.com/id?1019011 http://www.vupen.com/english/advisories/2007/4035 https://exchange.xforce.ibmcloud.com/vulnerabilities/38718 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2007-5632
https://notcve.org/view.php?id=CVE-2007-5632
Multiple unspecified vulnerabilities in the kernel in Sun Solaris 8 through 10 allow local users to cause a denial of service (panic), related to the support for retrieval of kernel statistics, and possibly related to the sfmmu_mlspl_enter or sfmmu_mlist_enter functions. Múltiples vulnerabilidades no especificadas en el kernel en Sun Solaris 8 hasta la 10 permite a usuarios locales una denegación de servicio (panic), relacionado con el apoyo de la recuperación del núcleo de las estadísticas, y posiblemente relacionadas con las funciones sfmmu_mlspl_enter o sfmmu_mlist_enter. • http://osvdb.org/38483 http://secunia.com/advisories/27306 http://secunia.com/advisories/27536 http://securitytracker.com/id?1018838 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103064-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201339-1 http://support.avaya.com/elmodocs2/security/ASA-2007-452.htm http://www.securityfocus.com/bid/26131 http://www.vupen.com/english/advisories/2007/3543 https://exchange.xforce.ibmcloud.com/vulnerabilities/37289 https: •
CVE-2007-5462
https://notcve.org/view.php?id=CVE-2007-5462
Unspecified vulnerability in the Sun Solaris RPC services library (librpcsvc) on Solaris 8 through 10 allows remote attackers to cause a denial of service (mountd crash) via unspecified packets to a server that exports many filesystems, and allows local users to cause a denial of service (automountd crash) via unspecified requests to mount filesystems from a server that exports many filesystems. Vulnerabilidad no especificada en la biblioteca de servicios RPC Sun Solaris (librpcsvc) en Solaris 8 hasta 10 permite a atacantes remotos provocar una denegación de servicio (caída de mountd) mediante paquetes no especificados a un servidor que exporta múltiples sistemas de ficheros, y permite a usuarios locales provocar una denegación de servicio (caída de automountd) mediante peticiones no especificadas para montar sistemas de ficheros desde un servidor que exporta múltiples sistemas de ficheros. • http://osvdb.org/40814 http://secunia.com/advisories/27183 http://secunia.com/advisories/27386 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103082-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200590-1 http://support.avaya.com/elmodocs2/security/ASA-2007-437.htm http://www.securityfocus.com/bid/26071 http://www.securitytracker.com/id?1018818 http://www.vupen.com/english/advisories/2007/3490 https://exchange.xforce.ibmcloud.com/vulnerabilities/37194 h • CWE-20: Improper Input Validation •
CVE-2007-5365 – Ubuntu 6.06 - DHCPd Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-5365
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU. Un desbordamiento de búfer en la región stack de la memoria en la función cons_options en el archivo options.c en dhcpd en OpenBSD versiones 4.0 hasta 4.2, y algunas otras implementaciones de dhcpd basadas en ISC dhcp-2, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo del demonio) por medio de una petición DHCP que especifica un tamaño máximo de mensaje más pequeño que el IP MTU mínimo. • https://www.exploit-db.com/exploits/4601 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354 http://secunia.com/advisories/27160 http://secunia.com/advisories/27273 http://secunia.com/advisories/27338 http://secunia.com/advisories/27350 http://secunia.com/advisories/32668 http://securitytracker.com/id?1021157 http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1 http://www.coresecurity • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5319
https://notcve.org/view.php?id=CVE-2007-5319
Unspecified vulnerability in the vuidmice STREAMS modules in Sun Solaris 8, 9, and 10 allows local users with console (/dev/console) access to cause a denial of service ("unusable" system console) via unspecified vectors. Vulnerabilidad no especificada en los módulos STREAMS vuidmice de Sun Solaris 8, 9, y 10 permite a usuarios locales con acceso a la consola (/dev/console) provocar una denegación de servicio (consola del sistema "inutilizada") a través de vectores no especificados. • http://osvdb.org/37715 http://secunia.com/advisories/27135 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103065-1 http://www.securityfocus.com/bid/25971 http://www.securitytracker.com/id?1018781 http://www.vupen.com/english/advisories/2007/3416 https://exchange.xforce.ibmcloud.com/vulnerabilities/37021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1989 •