Page 2 of 10 results (0.015 seconds)

CVSS: 6.2EPSS: 96%CPEs: 22EXPL: 0

nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option. nfsd en el Kernel de Linux anteriores a la v2.6.28.9 no detiene la capacidad de CAP_MKNOD antes del manejo de una petición de usuario en un hilo, lo que permite a usuarios locales crear nodos de dispositivo, como se ha demostrado en un sistema de ficheros que ha sido exportado con la opción root_squash. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=76a67ec6fb79ff3570dcb5342142c16098299911 http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html http://secunia.com/advisories/34422 http://secunia.com/advisories/34432 http://sec • CWE-16: Configuration •

CVSS: 7.1EPSS: 1%CPEs: 358EXPL: 1

The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an "rt_cache leak." La función icmp_send en net/ipv4/icmp.c en el kernel Linux anerior a v2.6.25, cuando se configura como un router con una ruta RECHAZADA, no gestiona apropiadamente el Protocolo Independiente de Caché de Destino (alias DST) en alguna situación que involucra transmisión de un mensaje ICMP Host inalcanzable, el cual permite a los atacantes remotos causar una denegación de servicio (conectividad parada) enviando una larga serie de paquetes a muchos direcciones IP de destino con esta ruta RECHAZADA, RELATIVA a "rt_cache leak." • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 http://openwall.com/lists/oss-security/2009/03/11/2 http://secunia.com/advisories/33758 http://secunia.com/advisories/37471 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 http://www.redhat.com/support/errata/RHSA-2009-0326.html http://www.securityfocus.com/archive/1/507985/100/0/threaded http://www.securityfocus.com/bid/34084 http:/&#x • CWE-400: Uncontrolled Resource Consumption •

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 0

VMware VirtualCenter 2.5 before Update 3 build 119838 on Windows displays a user's password in cleartext when the password contains unspecified special characters, which allows physically proximate attackers to steal the password. VMware VirtualCenter 2.5 antes de la actualización 3 build 119838 sobre Windows muestra la contraseña de un usuario en texto sin formato cuando la contraseña contiene caracteres especiales no especificados, lo cual permite robar la contraseña a atacantes físicamente próximos. • http://marc.info/?l=bugtraq&m=122331139823057&w=2 http://secunia.com/advisories/32179 http://secunia.com/advisories/32180 http://www.securityfocus.com/archive/1/497041/100/0/threaded http://www.securityfocus.com/bid/31569 http://www.securitytracker.com/id?1020992 http://www.vmware.com/security/advisories/VMSA-2008-0016.html http://www.vupen.com/english/advisories/2008/2740 https://exchange.xforce.ibmcloud.com/vulnerabilities/45664 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

VMware VirtualCenter 2.5 before Update 2 and 2.0.2 before Update 5 relies on client-side "enabled/disabled functionality" for access control, which allows remote attackers to determine valid user names by enabling functionality in the GUI and then making an "attempt to assign permissions to other system users." VirtualCenter de VMware versión 2.5 anterior a Update 2 y versión 2.0.2 anterior a Update 5, se basa en la función "enabled/disabled functionality" para el control de acceso, lo que permite a los atacantes remotos determinar nombres de usuario comprobados mediante la habilitación de la funcionalidad en la GUI y luego haciendo un "attempt to assign permissions to other system users". • http://secunia.com/advisories/31468 http://securityreason.com/securityalert/4150 http://www.insomniasec.com/advisories/ISVA-080812.1.htm http://www.securityfocus.com/archive/1/495386/100/0/threaded http://www.securityfocus.com/bid/30664 http://www.securitytracker.com/id?1020693 http://www.vmware.com/security/advisories/VMSA-2008-0012.html http://www.vmware.com/support/vi3/doc/releasenotes_vc202u5.html http://www.vupen.com/english/advisories/2008/2363 https://exchange.xforce.ibmclou • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

VMWare VirtualCenter client 2.x before 2.0.1 Patch 1 (Build 33643) and 1.4.x before 1.4.1 Patch 1 (Build 33425), when server certificate verification is enabled, does not verify the server's X.509 certificate when creating an SSL session, which allows remote malicious servers to spoof valid servers via a man-in-the-middle attack. El cliente VMWare VirtualCenter 2.x anterior a 2.0.1 Patch 1 (Build 33463) y 1.4.x anterior a 1.4.1 Patch 1 (Build 33425), cuando la verificación de certificados de servidor está habilitada, no verifica el certificado X.509 del servidor cuando crea una sesión SSL, lo cual permite a servidores remotos maliciosos suplantar a servidores válidos mediante un ataque de "hombre en medio" (man-in-the-middle). • http://kb.vmware.com/kb/4646606 http://secunia.com/advisories/23053 http://securitytracker.com/id?1017270 http://www.securityfocus.com/archive/1/452275/100/0/threaded http://www.securityfocus.com/bid/21231 http://www.vmware.com/download/vi/vc-201-200611-patch.html http://www.vupen.com/english/advisories/2006/4655 https://exchange.xforce.ibmcloud.com/vulnerabilities/30477 • CWE-20: Improper Input Validation •