CVE-2008-2826 – kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
https://notcve.org/view.php?id=CVE-2008-2826
Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure. Desbordamiento de entero en la función sctp_getsockopt_local_addrs_old de net/sctp/socket.c en la funcionalidad Stream Control Transmission Protocol (sctp)(Protocolo de Transmisión del Control de Flujo) en el kernel de Linux anterior a 2.6.25.9 permite a usuarios locales provocar una denegación de servicio (agotamiento de recursos y parada de sistema) mediante vectores que involucran un campo addr_num largo en una estructura de datos sctp_getaddrs_old. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.9 http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html http://lwn.net/Articles/287350 http://secunia.com/advisories/30901 http://secunia.com/advisories/31107 http://secunia.com/advisories/31202 http://secunia.co • CWE-190: Integer Overflow or Wraparound •
CVE-2008-1567
https://notcve.org/view.php?id=CVE-2008-1567
phpMyAdmin before 2.11.5.1 stores the MySQL (1) username and (2) password, and the (3) Blowfish secret key, in cleartext in a Session file under /tmp, which allows local users to obtain sensitive information. phpMyAdmin versiones anteriores a 2.11.5.1, almacena la clave secreta MySQL de (1) nombre de usuario (2) contraseña, y (3) Blowfish, en texto sin cifrar en un archivo de Sesión bajo /tmp, que permite a los usuarios locales obtener información confidencial. • http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html http://secunia.com/advisories/29588 http://secunia.com/advisories/29613 http://secunia.com/advisories/29964 http://secunia.com/advisories/30816 http://secunia.com/advisories/32834 http://secunia.com/advisories/33822 http://sourceforge.net/tracker/index.php?func=detail&aid=1909711&group_id=23067&atid=377408 http://www.debian.org/security/2 • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2007-5729
https://notcve.org/view.php?id=CVE-2007-5729
The NE2000 emulator in QEMU 0.8.2 allows local users to execute arbitrary code by writing Ethernet frames with a size larger than the MTU to the EN0_TCNT register, which triggers a heap-based buffer overflow in the slirp library, aka NE2000 "mtu" heap overflow. NOTE: some sources have used CVE-2007-1321 to refer to this issue as part of "NE2000 network driver and the socket code," but this is the correct identifier for the mtu overflow vulnerability. El emulador NE2000 en QEMU 0.8.2 permite a usuarios locales ejecutar código de su elección a través de la escritura de la estructura ethernet con un tamaño mayor que el MTU en el registro EN0_TCNT, lo cual dispara un desbordamiento de búfer basado en pila en la libreria slirp, también conocida como desbordamiento de pila NE2000 "mtu". NOTA: algunas fuentes han utilizado CVE-2007-1321 para referenciar este asunto como una parte de "el controlado de red NE2000 y el código de conexión," pero este es el indentificador correcto para la vulnerabilidad de desbordamiento de mtu. • http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html http://osvdb.org/42986 http://secunia.com/advisories/25073 http://secunia.com/advisories/25095 http://secunia.com/advisories/27486 http://secunia.com/advisories/29129 http://secunia.com/advisories/33568 http://taviso.decsystem.org/virtsec.pdf http://www.attrition.org/pipermail/vim/2007-October/001842.html http://www.debian.org/security/2007/dsa-1284 http://www.mandriva.com/security/advisories?name=MDKSA& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-1320 – xen/qemu Cirrus LGD-54XX "bitblt" Heap Overflow
https://notcve.org/view.php?id=CVE-2007-1320
Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" heap overflow. Múltiples desbordamientos de búfer en la región heap de la memoria en la función cirrus_invalidate_region en la extensión Cirrus VGA en QEMU versión 0.8.2, como es usado en Xen y posiblemente otros productos, podrían permitir a usuarios locales ejecutar código arbitrario por medio de vectores no especificados relacionados a "attempting to mark non-existent regions as dirty," también se conoce como el desbordamiento de la pila "bitblt". • http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html http://osvdb.org/35494 http://secunia.com/advisories/25073 http://secunia.com/advisories/25095 http://secunia.com/advisories/27047 http://secunia.com/advisories/27085 http://secunia.com/advisories/27103 http://secunia.com/advisories/27486 http://secunia.com/advisories/29129 http://secunia.com/advisories/30413 http://secunia.com/advisories/33568 http://taviso.decsystem.org/virtsec.pdf http://www.de • CWE-787: Out-of-bounds Write •