Page 2 of 7 results (0.002 seconds)

CVSS: 10.0EPSS: 13%CPEs: 20EXPL: 5

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication. • https://www.exploit-db.com/exploits/24360 https://www.exploit-db.com/exploits/24361 http://marc.info/?l=bugtraq&m=109208394910086&w=2 http://marc.info/?l=bugtraq&m=110886670528775&w=2 http://secunia.com/advisories/12251 http://security.gentoo.org/glsa/glsa-200408-08.xml http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://www.securityfocus.com/bid/10899 https://exchange.xforce.ibmcloud.com/vulnerabilities/16935 •

CVSS: 7.5EPSS: 9%CPEs: 17EXPL: 3

Buffer overflow in net.c for cfengine 2.x before 2.0.8 allows remote attackers to execute arbitrary code via certain packets with modified length values, which is trusted by the ReceiveTransaction function when using a buffer provided by the BusyWithConnection function. Desbordamiento de búfer en net.c de cfengine 2.x a 2.0.8 permite a atacantes remotos ejecutar código arbitrario mediante ciertos paquetes con valores de longitud modificados, del cual se fia la función ReceiveTransaction cuando usa un bufer provisto por la función BusyWithConnection. • https://www.exploit-db.com/exploits/105 https://www.exploit-db.com/exploits/23183 https://www.exploit-db.com/exploits/23182 http://marc.info/?l=bugtraq&m=106451047819552&w=2 http://marc.info/?l=bugtraq&m=106485375218280&w=2 http://marc.info/?l=bugtraq&m=106546086216984&w=2 •