Page 21 of 263 results (0.011 seconds)

CVSS: 4.3EPSS: 95%CPEs: 13EXPL: 0

softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. softmagic.c en archivo anterior a 5.17 y libmagic permite a atacantes dependientes de contexto causar una denegación de servicio (acceso a memoria fuera de rango y caída) a través de desplazamientos (“offsets”) manipulados en el softmagic de un ejecutable PE. A denial of service flaw was found in the way the File Information (fileinfo) extension handled search rules. A remote attacker could use this flaw to cause a PHP application using fileinfo to crash or consume an excessive amount of CPU. • http://bugs.gw.com/view.php?id=313 http://lists.opensuse.org/opensuse-updates/2014-03/msg00034.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00037.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00084.html http://rhn.redhat.com/errata/RHSA-2014-1765.html http://seclists.org/oss-sec/2014/q1/473 http://seclists.org/oss-sec/2014/q1/504 http://seclists.org/oss-sec/2014/q1/505 http://support.apple.com/kb/HT6443 http://www.debian.or • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 3%CPEs: 26EXPL: 0

Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion. Desbordamiento de buffer en copy.c en Mutt anterior a 1.5.23 permite a atacantes remotos causar una denegación de servicio (caída) a través de una línea de cabecera RFC2047 manipulada, relacionado con la expansión de dirección. • http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00001.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00083.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00085.html http://rhn.redhat.com/errata/RHSA-2014-0304.html http://www.debian.org/security/2014/dsa-2874 http://www.mutt.org/doc/devel/ChangeLog http://www.securityfocus.com/bid/66165 http://www.securitytracker.com/id/1029919 http://www.ubuntu.com/usn/USN-2147-1 https://access&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons before 0.61.0 allows local users to overwrite arbitrary files and possibly have other unspecified impact via a symlink attack on /tmp/toto.fdf. Las funciones (1) extract_keys_from_pdf y (2) fill_pdf en pdf_ext.py en logilab-commons anterior a 0.61.0 permite a usuarios locales sobreescribir archivos arbitrarios y posiblemente tener otro impacto no especificado a través de un ataque symlink sobre /tmp/toto.fdf. • http://comments.gmane.org/gmane.comp.security.oss.general/11986 http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html http://secunia.com/advisories/57209 http://www.logilab.org/ticket/207561 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

The Execute class in shellutils in logilab-commons before 0.61.0 uses tempfile.mktemp, which allows local users to have an unspecified impact by pre-creating the temporary file. La clase Execute en shellutils en logilab-commons anterior a 0.61.0 utiliza tempfile.mktemp, lo que permite a usuarios locales tener un impacto no especificado mediante la precreación de un archivo temporal. • http://comments.gmane.org/gmane.comp.security.oss.general/11986 http://lists.opensuse.org/opensuse-updates/2014-02/msg00085.html http://secunia.com/advisories/57209 http://www.logilab.org/ticket/207562 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737051 •

CVSS: 8.8EPSS: 1%CPEs: 7EXPL: 0

Buffer overflow in the DecodePSDPixels function in coders/psd.c in ImageMagick before 6.8.8-5 might allow remote attackers to execute arbitrary code via a crafted PSD image, involving the L%06ld string, a different vulnerability than CVE-2014-2030. Un desbordamiento del búfer en la función DecodePSDPixels en el archivo coders/psd.c en ImageMagick versiones anteriores a 6.8.8-5, podría permitir a atacantes remotos ejecutar código arbitrario por medio de una imagen PSD diseñada, que involucra la cadena L%06ld, una vulnerabilidad diferente de CVE-2014-2030. • http://lists.opensuse.org/opensuse-updates/2014-03/msg00032.html http://lists.opensuse.org/opensuse-updates/2014-03/msg00039.html http://trac.imagemagick.org/changeset/14801 http://ubuntu.com/usn/usn-2132-1 http://www.openwall.com/lists/oss-security/2014/02/13/2 http://www.openwall.com/lists/oss-security/2014/02/13/5 https://www.openwall.com/lists/oss-security/2014/02/19/13 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •