Page 2 of 7 results (0.001 seconds)

CVSS: 7.5EPSS: 27%CPEs: 14EXPL: 0

Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username. Desbordamiento de búfer basado en la pila en el Módulo de análisis de Protocolos (PAM) de ISS, usado en ciertas versiones de RealSecure Network 7.0 y Server Sensor 7.0, Proventia series A, G, y M, Desktop 7.0 y 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, y BlackICE Server Protection 3.6, permite a atacantes remotos ejecutar código arbitrario mediante un paquete SMB conteniendo una petición de autenticación con un nombre de usuario largo. • http://marc.info/?l=bugtraq&m=107789851117176&w=2 http://secunia.com/advisories/10988 http://www.eeye.com/html/Research/Advisories/AD20040226.html http://www.eeye.com/html/Research/Upcoming/20040213.html http://www.kb.cert.org/vuls/id/150326 http://www.osvdb.org/4072 http://www.securityfocus.com/bid/9752 http://xforce.iss.net/xforce/alerts/id/165 https://exchange.xforce.ibmcloud.com/vulnerabilities/15207 •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

BlackICE Defender 2.9.cap and Server Protection 3.5.cdf, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets. • http://online.securityfocus.com/archive/1/294411 http://www.iss.net/security_center/static/10314.php http://www.securityfocus.com/bid/5917 •