Page 27 of 135 results (0.022 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

scratchbox2 1.99.0.24 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/dpkg.#####.tmp, (b) /tmp/missing_deps.#####, and (c) /tmp/sb2-pkg-chk.$tstamp.##### temporary files, related to the (1) dpkg-checkbuilddeps and (2) sb2-check-pkg-mappings scripts. scratchbox2 v1.99.0.24 permite a usuarios locales sobrescribir ficheros a su elección a través de un ataque de enlace simulado en los ficheros temporales (a) /tmp/dpkg.#####.tmp, (b) /tmp/missing_deps.#####, y (c) /tmp/sb2-pkg-chk.$tstamp.#####, relacionado con las secuencias de comando (scripts)(1) dpkg-checkbuilddeps y (2) sb2-check-pkg-mappings. • http://bugs.debian.org/496409 http://dev.gentoo.org/~rbu/security/debiantemp/scratchbox2 http://uvw.ru/report.lenny.txt http://www.openwall.com/lists/oss-security/2008/10/30/2 http://www.securityfocus.com/bid/30969 https://bugs.gentoo.org/show_bug.cgi?id=235770 https://exchange.xforce.ibmcloud.com/vulnerabilities/44907 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 2.1EPSS: 1%CPEs: 44EXPL: 1

The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error. La función dbus_signature_validat en la librería D-bus (libdbus), versiones anteriores a 1.2.4, permite a los atacantes remotos causar una denegación de servicios (aplicación suspendida) a través de un mensaje que contiene una firma mal formada, el cual lanza un error assertion. • https://www.exploit-db.com/exploits/7822 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html http://secunia.com/advisories/32127 http://secunia.com/advisories/32230 http://secunia.com/advisories/32281 http://secunia.com/advisories/32385 http://secunia.com/advisories/33396 http://www.debian.org/security/2008/dsa-1658 http://ww • CWE-20: Improper Input Validation •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Format string vulnerability in the grant helper (polkit-grant-helper.c) in PolicyKit 0.7 and earlier allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via format strings in a password. Vulnerabilidad de cadena de formato en el grant helper (polkit-grant-helper.c) en el PolicyKit 0.7 y anteriores permite a atacantes remotos provocar denegación de servicio (caída) y allows attackers to cause a denial of service (crash) posiblemente ejecutar código de su elección mediante cademas de formato en una contraseña. • http://bugs.freedesktop.org/show_bug.cgi?id=15295 http://gitweb.freedesktop.org/?p=PolicyKit.git%3Ba=commitdiff%3Bh=5bc86a14cc0e356bcf8b5f861674f842869b1be7 http://secunia.com/advisories/29755 http://www.mandriva.com/security/advisories?name=MDVSA-2008:087 http://www.securityfocus.com/bid/28702 http://www.vupen.com/english/advisories/2008/1254 https://bugs.launchpad.net/ubuntu/+source/policykit/+bug/205037 https://exchange.xforce.ibmcloud.com/vulnerabilities/41877 https://www.redhat.com/archives&# • CWE-134: Use of Externally-Controlled Format String •

CVSS: 4.6EPSS: 0%CPEs: 11EXPL: 0

dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface. dbus-daemon en D-Bus anterior a 1.0.3 y 1.1.x anterior a 1.1.20, reconoce atributos de send_interface en directivas de permiso en la política de seguridad sólo para llamadas a métodos completamente cualificados, esto permite a usuarios locales evitar las restricciones de acceso pretendidas mediante llamadas a métodos con una interfaz NULL. • http://lists.freedesktop.org/archives/dbus/2008-February/009401.html http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html http://secunia.com/advisories/29148 http://secunia.com/advisories/29160 http://secunia.com/advisories/29171 http://secunia.com/advisories/29173 http://secunia.com/advisories/29281 http://secunia.com/advisories/29323 http://secunia.com/advisories/30869 http://secunia.com/advisorie • CWE-863: Incorrect Authorization •

CVSS: 6.8EPSS: 6%CPEs: 9EXPL: 0

Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function. Un desbordamiento de enteros en la función StreamPredictor::StreamPredictor en xpdf versión 3.02, tal como es usado en (1) poppler anterior a versión 0.5.91, (2) gpdf anterior a versión 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, ( 6) PDFedit, y otros productos, podrían permitir que los atacantes remotos ejecuten código arbitrario por medio de un archivo PDF creado que causa un desbordamiento del búfer en la región stack de la memoria, en la función StreamPredictor::getNextLine. • ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.02pl1.patch ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc http://bugs.gentoo.org/show_bug.cgi?id=187139 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194 http://osvdb.org/40127 http://secunia.com/advisories/26188 http://secunia.com/advisories/26251 http://secunia.com/advisories/26254 http://secunia.com/advisories/26255 http://secunia.com/advisories/26257 http://secunia.com/advisories/26278 • CWE-190: Integer Overflow or Wraparound •