CVE-2010-2632 – libc/glob - Resource Exhaustion / Remote ftpd-anonymous (Denial of Service)
https://notcve.org/view.php?id=CVE-2010-2632
Unspecified vulnerability in the FTP Server in Oracle Solaris 8, 9, 10, and 11 Express allows remote attackers to affect availability. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable researcher that this is an issue in the glob implementation in libc that allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames. Vulnerabilidad no especificada en FTP Server para Oracle Solaris v8, v9, v10, v11 y Express permite a atacantes remotos afectar a la disponibilidad, relacionado con FTP. FreeBSD version 9.1 suffers from a remote ftpd denial of service vulnerability. • https://www.exploit-db.com/exploits/15215 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10598 http://secunia.com/advisories/42984 http://secunia.com/advisories/43433 http://secunia.com/advisories/55212 http://securityreason.com/achievement_securityalert/89 http://securityreason.com/achievement_securityalert/97 http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html http://www.securitytracker.com/id?1024975 http://www.vupen.com/english/advisories/2011/0151 https:/ •
CVE-2007-0882 – Solaris 10/11 Telnet - Remote Authentication Bypass
https://notcve.org/view.php?id=CVE-2007-0882
Argument injection vulnerability in the telnet daemon (in.telnetd) in Solaris 10 and 11 (SunOS 5.10 and 5.11) misinterprets certain client "-f" sequences as valid requests for the login program to skip authentication, which allows remote attackers to log into certain accounts, as demonstrated by the bin account. La vulnerabilidad de inyección argumentos en el demonio telnet (in.telnetd) en Solaris versiones 10 y 11 (SunOS versiones 5.10 y 5.11) interpreta erróneamente ciertas secuencias "-f" del cliente como peticiones válidas para que el programa de inicio de sesión omita la autenticación, lo que permite a los atacantes remotos iniciar sesión en ciertas cuentas, como fue demostrado por la cuenta bin. • https://www.exploit-db.com/exploits/9918 https://www.exploit-db.com/exploits/16328 https://www.exploit-db.com/exploits/3293 http://erratasec.blogspot.com/2007/02/trivial-remote-solaris-0day-disable.html http://isc.sans.org/diary.html?storyid=2220 http://osvdb.org/31881 http://seclists.org/fulldisclosure/2007/Feb/0217.html http://secunia.com/advisories/24120 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102802-1 http://www.kb.cert.org/vuls/id/881872 ht • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •