Page 16 of 97 results (0.013 seconds)

CVSS: 5.0EPSS: 6%CPEs: 6EXPL: 1

Unspecified vulnerability in the NFS client module in Sun Solaris 8 through 10 before 20070524, when operating as an NFS server, allows remote attackers to cause a denial of service (crash) via certain Access Control List (acl) packets. Vulnerabilidad no especificada en el módulo cliente NFS de Sun Solaris 8 hasta 10 anterior al 24/05/2007, cuando opera como un servidor NFS, permite a atacantes remotos provocar una denegación de servicio (caída) mediante determinados paquetes de Lista de Control de Acceso (Access Control List o acl). • http://osvdb.org/34908 http://secunia.com/advisories/25403 http://secunia.com/advisories/25879 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102911-1 http://support.avaya.com/elmodocs2/security/ASA-2007-245.htm http://www.securityfocus.com/bid/24145 http://www.securitytracker.com/id?1018129 http://www.vupen.com/english/advisories/2007/1943 https://exchange.xforce.ibmcloud.com/vulnerabilities/34504 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 4.7EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Sun Solaris 9, when Solaris Auditing (BSM) is enabled for file read, write, attribute modify, create, or delete audit classes, allows local users to cause a denial of service (panic) via unknown vectors, possibly related to the audit_savepath function. Vulnerabilidad no especificada en Sun Solaris 9, cuando Solaris Auditing (BSM) está habilitado para la lectura, escritura, modificación de atributos o borrado de clases de auditoria de fichero, permite a usuarios locales provocar denegación de servicio (panic) a través de vectores desconocidos, posiblemente relacionado con la función audit_savepath. • http://osvdb.org/34904 http://secunia.com/advisories/25081 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102900-1 http://www.securityfocus.com/bid/23751 http://www.securitytracker.com/id?1017992 http://www.vupen.com/english/advisories/2007/1611 https://exchange.xforce.ibmcloud.com/vulnerabilities/34003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1085 •

CVSS: 5.0EPSS: 11%CPEs: 2EXPL: 0

Unspecified vulnerability in the IP implementation in Sun Solaris 8 and 9 allows remote attackers to cause a denial of service (CPU consumption) via crafted IP packets, probably related to fragmented packets with duplicate or missing fragments. Vulnerabilidad no especificada en la implementación de IP de Sun Solaris 8 y 9 permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU) mediante paquetes IP manipulados, probablemente relacionados con paquetes fragmentados con fragmentos duplicados o perdidos. • http://osvdb.org/34901 http://secunia.com/advisories/24857 http://secunia.com/advisories/24987 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102866-1 http://support.avaya.com/elmodocs2/security/ASA-2007-165.htm http://www.securityfocus.com/bid/23468 http://www.securitytracker.com/id?1017911 http://www.vupen.com/english/advisories/2007/1375 https://exchange.xforce.ibmcloud.com/vulnerabilities/33597 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

The Javascript engine in Mozilla 1.7 and earlier on Sun Solaris 8, 9, and 10 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used. NOTE: this issue might be related to CVE-2006-3805. El motor de Javascript en Mozilla 1.7 y anteriores en Sun Solaris 8, 9, y 10 podría permitir a atacantes remotos ejecutar código de su elección a través de vectores que afectan al colector de basura que provoca el borrado de un objeto temporal que todavía se está utilizando. NOTA: este asunto podría estar relacionado con CVE-2006-3805. • http://secunia.com/advisories/24624 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1 http://www.vupen.com/english/advisories/2007/1178 •

CVSS: 5.8EPSS: 1%CPEs: 2EXPL: 0

The libike library, as used by in.iked, elfsign, and kcfd in Sun Solaris 9 and 10, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents libike from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339. La biblioteca libike, tal y como se usa en in.iked, elfsign, y kcfd en Sun Solaris 9 y 10, cuando usan una clave RSA con exponente 3, borra caracterés de relleno PKCS-1 antes de genear la función resumen (hash), lo cual permite a atacantes remotos falsificar una firma PKCS #1 v1.5 que se ha firmado con esa clave RSA y evita a libike que verifique correctamente certificados X.509 y otros, que usen PKCS #1, vulnerabilidad similar a CVE-2006-4339. • http://secunia.com/advisories/23104 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1 http://www.vupen.com/english/advisories/2006/4744 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1648 •