Page 22 of 110 results (0.007 seconds)

CVSS: 5.0EPSS: 4%CPEs: 59EXPL: 0

The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote attackers to cause a denial of service (hang). La funcionalidad RPC de Sun en múltiples implementaciones de libc no provee de un mecanismo de exceso de tiempo cuando se leen datos de conexiones TCP, lo que permite a atacantes remotos causar una denegación de servicio (cuelgue) • ftp://patches.sgi.com/support/free/security/advisories/20021103-01-P http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/51082 http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0800.1 http://www.info.apple.com/usen/security/security_updates.html http://www.iss.net/security_center/static/10539.php http://www.kb.cert.org/vuls/id/266817 http://www.securityfocus.com/bid/6103 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.m •

CVSS: 5.0EPSS: 16%CPEs: 1EXPL: 0

The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash). Desbordamiento de búfer en el código de resolución de glib 2.2.5 y anteriores permite a atacantes remotos causar una denegación de servicio (caida) mediante una operación de lectura en paquetes DNS largos. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-015.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535 http://www.iss.net/security_center/static/10295.php http://www.kb.cert.org/vuls/id/738331 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:009 http://www.redhat.com/support/errata/RHSA-2002-197.html http://www.redhat.com/support/errata/RHSA-2002-258.html http://www.redhat.com/support/errata/RHSA-2003-022.html htt •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. Desbordamiento de búfer en las funciones de resolución de DNS que buscan nombres de red y direcciones, como en BIND 4.9.8 y glibc 2.2.5 y anteriores, permiten que servidores DNS remotos ejecuten código arbitrario por medio de una subrutina usada por funciones tales como getnetbyname y getnetbyaddr. • http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 http://marc.info/?l=bugtraq&m=102581482511612&w=2 http://rhn.redhat.com/errata/RHSA-2002-139.html http://www.kb.cert.org/vuls/id/542971 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php https://access.redhat.com/security/cve/CVE-2002-0684 https://bugzilla.redhat.com/show_bug.cgi?id=1616795 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH. • https://www.exploit-db.com/exploits/19503 http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0509.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0525.html http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://www.calderasystems.com/support/security/advisories/CSSA-2000-028.0.txt http://www.debian.org/security/2000/20000902 http://www.linux-mandrake.com/en/updates/MDKSA-2000-040.php3 http:/&# •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results. • http://www.securityfocus.com/bid/1166 •