Page 3 of 14 results (0.027 seconds)

CVSS: 5.0EPSS: 1%CPEs: 20EXPL: 2

The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash). • http://marc.info/?l=bugtraq&m=109208394910086&w=2 http://secunia.com/advisories/12251 http://security.gentoo.org/glsa/glsa-200408-08.xml http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://www.securityfocus.com/bid/10900 https://exchange.xforce.ibmcloud.com/vulnerabilities/16937 •

CVSS: 10.0EPSS: 13%CPEs: 20EXPL: 5

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication. • https://www.exploit-db.com/exploits/24360 https://www.exploit-db.com/exploits/24361 http://marc.info/?l=bugtraq&m=109208394910086&w=2 http://marc.info/?l=bugtraq&m=110886670528775&w=2 http://secunia.com/advisories/12251 http://security.gentoo.org/glsa/glsa-200408-08.xml http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://www.securityfocus.com/bid/10899 https://exchange.xforce.ibmcloud.com/vulnerabilities/16935 •

CVSS: 7.5EPSS: 9%CPEs: 17EXPL: 3

Buffer overflow in net.c for cfengine 2.x before 2.0.8 allows remote attackers to execute arbitrary code via certain packets with modified length values, which is trusted by the ReceiveTransaction function when using a buffer provided by the BusyWithConnection function. Desbordamiento de búfer en net.c de cfengine 2.x a 2.0.8 permite a atacantes remotos ejecutar código arbitrario mediante ciertos paquetes con valores de longitud modificados, del cual se fia la función ReceiveTransaction cuando usa un bufer provisto por la función BusyWithConnection. • https://www.exploit-db.com/exploits/105 https://www.exploit-db.com/exploits/23183 https://www.exploit-db.com/exploits/23182 http://marc.info/?l=bugtraq&m=106451047819552&w=2 http://marc.info/?l=bugtraq&m=106485375218280&w=2 http://marc.info/?l=bugtraq&m=106546086216984&w=2 •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in cfd daemon in GNU CFEngine before 1.6.0a11 allows attackers to execute arbitrary commands via format characters in the CAUTH command. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-013.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0004.html http://www.linux-mandrake.com/en/security/MDKSA-2000-061.php3?dis=7.1 http://www.securityfocus.com/bid/1757 https://exchange.xforce.ibmcloud.com/vulnerabilities/5630 •