Page 2 of 8 results (0.007 seconds)

CVSS: 5.0EPSS: 15%CPEs: 3EXPL: 1

Array index error in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to cause a denial of service (crash) via (1) large num_action values in the ProcAuSetElements function in server/dia/audispatch.c or (2) a large inputNum parameter to the compileInputs function in server/dia/auutil.c. Error de índice de array en Network Audio System (NAS) anterior a 1.8a SVN 237 permite a atacantes remotos provocar una denegación de servicio (caída) mediante (1) valores grandes de num_action en la función ProcAuSetElements de server/dia/audispatch.c o (2) un parámetro inputNum grande en la función compileInputs de server/dia/auutil.c. • http://aluigi.altervista.org/adv/nasbugs-adv.txt http://secunia.com/advisories/24527 http://secunia.com/advisories/24601 http://secunia.com/advisories/24628 http://secunia.com/advisories/24638 http://secunia.com/advisories/24980 http://security.gentoo.org/glsa/glsa-200704-20.xml http://www.debian.org/security/2007/dsa-1273 http://www.mandriva.com/security/advisories?name=MDKSA-2007:065 http://www.radscan.com/nas/HISTORY http://www.securityfocus.com/archive/1/464606/30& •

CVSS: 10.0EPSS: 18%CPEs: 3EXPL: 1

Stack-based buffer overflow in the accept_att_local function in server/os/connection.c in Network Audio System (NAS) before 1.8a SVN 237 allows remote attackers to execute arbitrary code via a long path slave name in a USL socket connection. Desbordamiento de búfer basado en pila en la función accept_att_local en server/os/connection.c de Network Audio System (NAS) anterior a 1.8a SVN 237 permite a atacantes remotos ejecutar código de su elección mediante un nombre largo una conexión de socket USL. • http://aluigi.altervista.org/adv/nasbugs-adv.txt http://secunia.com/advisories/24527 http://secunia.com/advisories/24601 http://secunia.com/advisories/24628 http://secunia.com/advisories/24638 http://secunia.com/advisories/24783 http://secunia.com/advisories/24980 http://security.gentoo.org/glsa/glsa-200704-20.xml http://www.debian.org/security/2007/dsa-1273 http://www.mandriva.com/security/advisories?name=MDKSA-2007:065 http://www.radscan.com/nas/HISTORY http://ww •

CVSS: 6.9EPSS: 1%CPEs: 1EXPL: 2

Multiple buffer overflows in Conquest 8.2a and earlier (1) allow local users to gain privileges by querying a metaserver that sends a long server entry processed by metaGetServerList and allow remote metaservers to execute arbitrary code via a long server entry processed by metaGetServerList; (2) allow attackers to have an unknown impact by exceeding the configured number of metaservers; and allow remote attackers to corrupt memory via a SP_CLIENTSTAT packet with certain values of (3) unum or (4) snum, different vulnerabilities than CVE-2003-0933. Múltiples desbordamientos de búfer en Conquest 8.2a y anteriores (1) permiten a usuarios locales obtener privilegios haciendo una petición a un metaservidor que envía una entrada de servidor larga procesada por metaGetServerList; (2) permite a atacantes tener un impacto desconocido excediendo el número configurado de metaservidores; y permite a atacantes remotos corromper la memoria mediante un paquete SP_CLIENTSTAT con determinados valores de (3) unum o (4) snum, vulnerabilidades distintas de CVE-2003-0933. • https://www.exploit-db.com/exploits/29717 http://secunia.com/advisories/24370 http://securityreason.com/securityalert/2399 http://www.radscan.com/conquest/cq-ml/msg00169.html http://www.securityfocus.com/archive/1/462184/100/0/threaded http://www.securityfocus.com/bid/22855 http://www.vupen.com/english/advisories/2007/0854 https://exchange.xforce.ibmcloud.com/vulnerabilities/32849 https://exchange.xforce.ibmcloud.com/vulnerabilities/32860 •