Page 23 of 122 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Integer overflow in the process_envvars function in elf/rtld.c in glibc before 2.5-rc4 might allow local users to execute arbitrary code via a large LD_HWCAP_MASK environment variable value. NOTE: the glibc maintainers state that they do not believe that this issue is exploitable for code execution ** EN DISPUTA ** Desbordamiento de enteros en la función process_envvars en elf/rtld.c de glibc en versiones anteriores a la 2.5-rc4 permite a usuarios locales ejecutar código arbitrario mediante un valor grande de la variable de entorno LD_HWCAP_MASK. NOTA: los mantenedores de glibc aseguran que no creen que esta cuestión sea vulnerable a través de la ejecución de código. • http://bugs.gentoo.org/show_bug.cgi?id=183844 http://osvdb.org/37901 http://secunia.com/advisories/25864 http://security.gentoo.org/glsa/glsa-200707-04.xml http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup http://www.securityfocus.com/bid/24758 http://www.securitytracker.com/id?1018334 http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html http://www.vupen.com/english/advisories/ • CWE-189: Numeric Errors •

CVSS: 2.1EPSS: 0%CPEs: 25EXPL: 0

GNU glibc 2.3.4 before 2.3.4.20040619, 2.3.3 before 2.3.3.20040420, and 2.3.2 before 2.3.2-r10 does not restrict the use of LD_DEBUG for a setuid program, which allows local users to gain sensitive information, such as the list of symbols used by the program. • http://bugs.gentoo.org/show_bug.cgi?id=59526 http://secunia.com/advisories/12306 http://www.gentoo.org/security/en/glsa/glsa-200408-16.xml http://www.redhat.com/support/errata/RHSA-2005-256.html http://www.redhat.com/support/errata/RHSA-2005-261.html http://www.securityfocus.com/bid/10963 https://exchange.xforce.ibmcloud.com/vulnerabilities/17006 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10762 https://access.redhat.com/security/cve&#x •

CVSS: 2.1EPSS: 0%CPEs: 26EXPL: 0

The glibcbug script in glibc 2.3.4 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2004-0968. • http://marc.info/?l=bugtraq&m=109899903129801&w=2 http://www.debian.org/security/2005/dsa-636 http://www.mandriva.com/security/advisories?name=MDKSA-2004:159 http://www.redhat.com/support/errata/RHSA-2005-261.html https://access.redhat.com/security/cve/CVE-2004-1382 https://bugzilla.redhat.com/show_bug.cgi?id=1617410 •

CVSS: 2.1EPSS: 0%CPEs: 30EXPL: 0

The catchsegv script in glibc 2.3.2 and earlier allows local users to overwrite files via a symlink attack on temporary files. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318 http://security.gentoo.org/glsa/glsa-200410-19.xml http://www.debian.org/security/2005/dsa-636 http://www.redhat.com/support/errata/RHSA-2004-586.html http://www.redhat.com/support/errata/RHSA-2005-261.html http://www.securityfocus.com/bid/11286 http://www.trustix.org/errata/2004/0050 https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 4.9EPSS: 0%CPEs: 18EXPL: 0

The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface. La función getifaddres en GNU libc (glibc) 2.2.4 y anteriores permite a usuarios locales causar una denegación de servicio enviando mensajes suplantando a otros usuarios al interfaz del kernel netlink. • http://www.redhat.com/support/errata/RHSA-2003-325.html http://www.redhat.com/support/errata/RHSA-2003-334.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11337 https://access.redhat.com/security/cve/CVE-2003-0859 https://bugzilla.redhat.com/show_bug.cgi?id=1617097 •