Page 17 of 415 results (0.009 seconds)

CVSS: 4.7EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Sun Solaris 9, when Solaris Auditing (BSM) is enabled for file read, write, attribute modify, create, or delete audit classes, allows local users to cause a denial of service (panic) via unknown vectors, possibly related to the audit_savepath function. Vulnerabilidad no especificada en Sun Solaris 9, cuando Solaris Auditing (BSM) está habilitado para la lectura, escritura, modificación de atributos o borrado de clases de auditoria de fichero, permite a usuarios locales provocar denegación de servicio (panic) a través de vectores desconocidos, posiblemente relacionado con la función audit_savepath. • http://osvdb.org/34904 http://secunia.com/advisories/25081 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102900-1 http://www.securityfocus.com/bid/23751 http://www.securitytracker.com/id?1017992 http://www.vupen.com/english/advisories/2007/1611 https://exchange.xforce.ibmcloud.com/vulnerabilities/34003 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1085 •

CVSS: 5.0EPSS: 11%CPEs: 2EXPL: 0

Unspecified vulnerability in the IP implementation in Sun Solaris 8 and 9 allows remote attackers to cause a denial of service (CPU consumption) via crafted IP packets, probably related to fragmented packets with duplicate or missing fragments. Vulnerabilidad no especificada en la implementación de IP de Sun Solaris 8 y 9 permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU) mediante paquetes IP manipulados, probablemente relacionados con paquetes fragmentados con fragmentos duplicados o perdidos. • http://osvdb.org/34901 http://secunia.com/advisories/24857 http://secunia.com/advisories/24987 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102866-1 http://support.avaya.com/elmodocs2/security/ASA-2007-165.htm http://www.securityfocus.com/bid/23468 http://www.securitytracker.com/id?1017911 http://www.vupen.com/english/advisories/2007/1375 https://exchange.xforce.ibmcloud.com/vulnerabilities/33597 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

The Javascript engine in Mozilla 1.7 and earlier on Sun Solaris 8, 9, and 10 might allow remote attackers to execute arbitrary code via vectors involving garbage collection that causes deletion of a temporary object that is still being used. NOTE: this issue might be related to CVE-2006-3805. El motor de Javascript en Mozilla 1.7 y anteriores en Sun Solaris 8, 9, y 10 podría permitir a atacantes remotos ejecutar código de su elección a través de vectores que afectan al colector de basura que provoca el borrado de un objeto temporal que todavía se está utilizando. NOTA: este asunto podría estar relacionado con CVE-2006-3805. • http://secunia.com/advisories/24624 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102865-1 http://www.vupen.com/english/advisories/2007/1178 •

CVSS: 5.8EPSS: 1%CPEs: 2EXPL: 0

The libike library, as used by in.iked, elfsign, and kcfd in Sun Solaris 9 and 10, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents libike from correctly verifying X.509 and other certificates that use PKCS #1, a similar issue to CVE-2006-4339. La biblioteca libike, tal y como se usa en in.iked, elfsign, y kcfd en Sun Solaris 9 y 10, cuando usan una clave RSA con exponente 3, borra caracterés de relleno PKCS-1 antes de genear la función resumen (hash), lo cual permite a atacantes remotos falsificar una firma PKCS #1 v1.5 que se ha firmado con esa clave RSA y evita a libike que verifique correctamente certificados X.509 y otros, que usen PKCS #1, vulnerabilidad similar a CVE-2006-4339. • http://secunia.com/advisories/23104 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1 http://www.vupen.com/english/advisories/2006/4744 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1648 •

CVSS: 7.8EPSS: 33%CPEs: 3EXPL: 0

Single CPU Sun systems running Solaris 7, 8, or 9, such as Netra, allows remote attackers to cause a denial of service (console hang) via a flood of small TCP/IP packets. NOTE: this issue has not been replicated by third parties. In addition, the cause is unknown, although it might be related to "jabber" and generation of a large amount of interrupts within the console, or a hardware error. Sistemas de una sola CPU Sun corriendo bajo Solaris 7, 8 o 9, como el Netra, permiten a atacantes remotos provocar una denegación de servicio (cuelgue de consola) mediante una inundación de pequeños paquetes TCP/IP. NOTA: esta vulnerabilidad no ha sido repetida por terceras partes. • http://www.securityfocus.com/archive/1/434449/30/4890/threaded http://www.securityfocus.com/archive/1/434920/30/4890/threaded http://www.securityfocus.com/archive/1/435107/30/4710/threaded http://www.securityfocus.com/archive/1/435146/30/4890/threaded •