Page 2 of 10 results (0.012 seconds)

CVSS: 6.8EPSS: 5%CPEs: 23EXPL: 0

Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive. Vulnerabilidad de salto de directorio en la función contains_dot_dot de src/names.c en GNU tar permite a atacantes remotos con la complicidad del usuario sobre-escribir ficheros de su elección mediante determinadas secuencias //.. (barra barra punto punto) en los enlaces simbólicos de directorio en un fichero TAR. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921 http://docs.info.apple.com/article.html?artnum=307179 http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://secunia.com/advisories/26573 http://secunia.com/advisories/26590 http://secunia.com/advisories/26603 http://secunia.com/advisories/26604 http://secunia.com/advisories/26655 http://secunia.com/advisories/26673 http://secunia.com/advisories/26674 http://secunia.com/advisories/26781 http:&#x •

CVSS: 6.8EPSS: 3%CPEs: 8EXPL: 0

libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c. libvorbis 1.1.2, y posiblemente otras versiones anteriores a 1.2.0, permite a atacantes dependientes del contexto provocar denegación de servicio a travñes de (1) un tipo de mapeo no válido, el cual dispara una lectura fuera de límite en la función vorbis_info_clear en info.c, y (2) tamaño de bloque no válido que dispara un fallo de segmento en la función read en block.c. • http://secunia.com/advisories/24923 http://secunia.com/advisories/26087 http://secunia.com/advisories/26232 http://secunia.com/advisories/26299 http://secunia.com/advisories/26429 http://secunia.com/advisories/26535 http://secunia.com/advisories/26865 http://secunia.com/advisories/27099 http://secunia.com/advisories/27439 http://secunia.com/advisories/28614 http://security.gentoo.org/glsa/glsa-200710-03.xml http://securitytracker.com/id?1018712 http://www.debian.org/sec •

CVSS: 6.8EPSS: 2%CPEs: 9EXPL: 0

lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c. NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors. En la biblioteca lib/info.c en libvorbis versión 1.1.2, y posiblemente otras versiones anteriores a 1.2.0, permite a los atacantes dependiendo del contexto causar una denegación de servicio y posiblemente ejecutar código arbitrario por medio de valores no válidos (1) blocksize_0 y (2) blocksize_1, que desencadenan una "heap overwrite" en la función _01inverse en el archivo res0.c. NOTA: este problema ha sido REESTRUCTURADO para que el CVE-2007-4029 maneje vectores adicionales. • http://secunia.com/advisories/24923 http://secunia.com/advisories/26087 http://secunia.com/advisories/26232 http://secunia.com/advisories/26299 http://secunia.com/advisories/26429 http://secunia.com/advisories/26535 http://secunia.com/advisories/26865 http://secunia.com/advisories/27099 http://secunia.com/advisories/28614 http://security.gentoo.org/glsa/glsa-200710-03.xml http://www.debian.org/security/2008/dsa-1471 http://www.isecpartners.com/advisories/2007-003-libvorbis&# • CWE-399: Resource Management Errors •

CVSS: 8.5EPSS: 5%CPEs: 45EXPL: 0

Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow. Desbordamiento de enteros en la función bdfReadCharacters en (1) X.Org libXfont before 20070403 y (2) freetype 2.3.2 y permite a usuarios remotos validados ejecutar código de su elección a través de fuentes manipuladas BDF, las cueles dan como resultado un desbordamiento de pila. • http://issues.foresightlinux.org/browse/FL-223 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html http://rhn.redhat.com/errata/RHSA-2007-0125.html http://secunia.com/advisories/24741 http://secunia.com/advisories/24745 http://secunia.com/advisories/ • CWE-189: Numeric Errors •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The chroot helper in rMake for rPath Linux 1 does not drop supplemental groups, which causes packages to be installed with insecure permissions and might allow local users to gain privileges. La ayuda chroot en rMake para rPath Linux 1 no elimina los grupos sumplementarios, lo que provoca que paquetes puedan ser instaladas con permisos inseguros y pudieran permitir que los usuarios locales ganen privilegios. • http://lists.rpath.com/pipermail/security-announce/2007-January/000137.html http://osvdb.org/32972 http://secunia.com/advisories/23922 https://exchange.xforce.ibmcloud.com/vulnerabilities/31942 https://issues.rpath.com/browse/RPL-987 •