Page 24 of 119 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in DNS resolver functions that perform lookup of network names and addresses, as used in BIND 4.9.8 and ported to glibc 2.2.5 and earlier, allows remote malicious DNS servers to execute arbitrary code through a subroutine used by functions such as getnetbyname and getnetbyaddr. Desbordamiento de búfer en las funciones de resolución de DNS que buscan nombres de red y direcciones, como en BIND 4.9.8 y glibc 2.2.5 y anteriores, permiten que servidores DNS remotos ejecuten código arbitrario por medio de una subrutina usada por funciones tales como getnetbyname y getnetbyaddr. • http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507 http://marc.info/?l=bugtraq&m=102581482511612&w=2 http://rhn.redhat.com/errata/RHSA-2002-139.html http://www.kb.cert.org/vuls/id/542971 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php https://access.redhat.com/security/cve/CVE-2002-0684 https://bugzilla.redhat.com/show_bug.cgi?id=1616795 •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

glibc2 does not properly clear the LD_DEBUG_OUTPUT and LD_DEBUG environmental variables when a program is spawned from a setuid program, which could allow local users to overwrite files via a symlink attack. • http://www.securityfocus.com/archive/1/85028 http://www.securityfocus.com/bid/1719 https://exchange.xforce.ibmcloud.com/vulnerabilities/5299 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The unsetenv function in glibc 2.1.1 does not properly unset an environmental variable if the variable is provided twice to a program, which could allow local users to execute arbitrary commands in setuid programs by specifying their own duplicate environmental variables such as LD_PRELOAD or LD_LIBRARY_PATH. • https://www.exploit-db.com/exploits/19503 http://archives.neohapsis.com/archives/bugtraq/2000-08/0436.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0509.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0525.html http://marc.info/?l=bugtraq&m=93760201002154&w=2 http://www.calderasystems.com/support/security/advisories/CSSA-2000-028.0.txt http://www.debian.org/security/2000/20000902 http://www.linux-mandrake.com/en/updates/MDKSA-2000-040.php3 http:/&# •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results. • http://www.securityfocus.com/bid/1166 •