Page 23 of 185 results (0.006 seconds)

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

The template-validate command in OpenStack Orchestration API (Heat) before 2015.1.3 (kilo) and 5.0.x before 5.0.1 (liberty) allows remote authenticated users to cause a denial of service (memory consumption) or determine the existence of local files via the resource type in a template, as demonstrated by file:///dev/zero. El comando template-validate en OpenStack Orchestration API (Heat) en versiones anteriores a 2015.1.3 (kilo) y 5.0.x en versiones anteriores a 5.0.1 (liberty) permite a usuarios remotos autenticados provocar una denegación de servicio (consumo de memoria) o determinar la existencia de archivos locales a través del tipo de recurso en una plantilla, según lo demostrado por el archivo:///dev/zero. A vulnerability was discovered in the OpenStack Orchestration service (heat), where a specially formatted template could be used to trick the heat-engine service into opening a local file. Although the file contents are never disclosed to the end user, an OpenStack-authenticated attacker could use this flaw to cause a denial of service or determine whether a given file name is present on the server. • http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176700.html http://rhn.redhat.com/errata/RHSA-2016-0266.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/81438 https://bugs.launchpad.net/heat/+bug/1496277 https://security.openstack.org/ossa/OSSA-2016-003.html https://access.redhat.com/security/cve/CVE-2015-5295 https://bugzilla.redhat.com/show_bug.cgi?id=1298295 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 6EXPL: 1

The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack. La función de verificación en el paquete RSA para Phython (Python-RSA) en versiones anteriores a 3.3 permite a atacantes falsificar firmas con un exponente público pequeño a través de un relleno de firma manipulado, también conocido como un ataque BERserk. • http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175897.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175942.html http://lists.opensuse.org/opensuse-updates/2016-01/msg00032.html http://www.openwall.com/lists/oss-security/2016/01/05/1 http://www.openwall.com/lists/oss-security/2016/01/05/3 http://www.securityfocus.com/bid/79829 https://bitbucket.org/sybren/python-rsa/pull-requests/14/security-fix-bb06-attack-in-verify-by/diff https: • CWE-20: Improper Input Validation •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 0

Swift3 before 1.9 allows remote attackers to conduct replay attacks via an Authorization request that lacks a Date header. Swift3 en versiones anteriores a 1.9 permite a atacantes remotos llevar a cabo ataques de repetición a través de una petición Authorization que carece de una cabecera Date. • http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174374.html http://www.debian.org/security/2016/dsa-3583 https://bugs.launchpad.net/swift3/+bug/1497424 https://github.com/openstack/swift3/blob/master/CHANGELOG https://swiftstack.com/docs/admin/release.html • CWE-20: Improper Input Validation •

CVSS: 7.4EPSS: 0%CPEs: 3EXPL: 0

The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL. La implementación de retorno de HTTPS en Shell In A Box (también conocido como shellinabox) en versiones anteriores a 2.19 hace que sea mas fácil para atacantes remotos llevar a cabo ataques de revinculación DNS a través de la URL "/plain". • http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175117.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175224.html http://www.openwall.com/lists/oss-security/2015/12/02/6 http://www.openwall.com/lists/oss-security/2015/12/02/7 https://github.com/shellinabox/shellinabox/issues/355 https://github.com/shellinabox/shellinabox/releases/tag/v2.19 • CWE-254: 7PK - Security Features •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

The mod_dialback module in Prosody before 0.9.9 does not properly generate random values for the secret token for server-to-server dialback authentication, which makes it easier for attackers to spoof servers via a brute force attack. El módulo mod_dialback en Prosody en versiones anteriores a 0.9.9 no genera adecuadamente valores aleatorios para para el token secreto en la autenticación de devolución de llamada de servidor a servidor, lo que hace que sea más fácil para atacantes suplantar servidores a través de un ataque de fuerza bruta. • http://blog.prosody.im/prosody-0-9-9-security-release http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175829.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175868.html http://www.debian.org/security/2016/dsa-3439 http://www.openwall.com/lists/oss-security/2016/01/08/5 https://prosody.im/issues/issue/571 https://prosody.im/security/advisory_20160108-2 •