CVE-2007-0460
https://notcve.org/view.php?id=CVE-2007-0460
Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations." Múltiples desbordamientos de búfer en ulogd para SUSE Linux versiones 9.3 hasta 10.1, y posiblemente otras distribuciones, presenta un impacto desconocido y vectores de ataque relacionados con "improper string length calculations." • http://osvdb.org/32939 http://secunia.com/advisories/23863 http://secunia.com/advisories/24524 http://security.gentoo.org/glsa/glsa-200703-17.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:028 http://www.novell.com/linux/security/advisories/2007_01_sr.html http://www.securityfocus.com/bid/22139 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-2752
https://notcve.org/view.php?id=CVE-2006-2752
The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password. El RedCarpet /etc/Ximian/rcd.conf, archivo de configuración en Novell Linux Desktop 9 y SUSE SLES 9 tiene permisos de lectura en todo el mundo, lo que permite a los atacantes obtener el rc (RedCarpet) contraseña. • http://secunia.com/advisories/20396 http://www.securityfocus.com/archive/1/435491/100/0/threaded •
CVE-2006-2703
https://notcve.org/view.php?id=CVE-2006-2703
The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack. • http://secunia.com/advisories/20396 http://www.securityfocus.com/archive/1/435491/100/0/threaded http://www.securityfocus.com/bid/18193 •
CVE-2006-0646
https://notcve.org/view.php?id=CVE-2006-0646
ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. • http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html http://secunia.com/advisories/18811 http://www.securityfocus.com/bid/16581 •
CVE-2006-0043
https://notcve.org/view.php?id=CVE-2006-0043
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020 http://lists.suse.com/archive/suse-security-announce/2006-Jan/0007.html http://secunia.com/advisories/18614 http://secunia.com/advisories/18638 http://secunia.com/advisories/18889 http://www.debian.org/security/2006/dsa-975 http://www.securityfocus.com/bid/16388 http://www.vupen.com/english/advisories/2006/0348 https://exchange.xforce.ibmcloud.com/vulnerabilities/24347 •