Page 3 of 25 results (0.009 seconds)

CVSS: 5.8EPSS: 0%CPEs: 3EXPL: 0

The installation functionality in the Novell Kanaka component before 2.8 for Novell Open Enterprise Server (OES) on Mac OS X does not verify the server's X.509 certificate during an SSL session, which allows man-in-the-middle attackers to spoof servers via an arbitrary certificate. La funcionalidad de instalación en el componente Novell Kanaka anterior a 2.8 para Novell Enterprise Server en OS X no verifica el certificado X.509 del servidor durante la sesión SSL, lo que permite a atacantes MiTM suplantar a los servidores a través de un certificado de su elección. • http://www.novell.com/support/kb/doc.php?id=7011965 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 93%CPEs: 5EXPL: 0

Buffer overflow in Novell iPrint Server in Novell Open Enterprise Server 2 (OES2) through SP3 on Linux allows remote attackers to execute arbitrary code via a crafted attributes-natural-language field. Desbordamiento de buffer en Novell iPrint Server de Novell Open Enterprise Server 2 (OES2) hasta la versión SP3 de Linux permite a atacantes remotos ejecutar código arbitrario a través de un campo attributes-natural-language modificado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability. The flaw exists within the mod_ipp apache module component of the iprint-server, which listens by default on 631/tcp. During the handling of get-printer-attributes requests containing a attributes-natural-language attribute cause a validation routine to be hit. • http://www.novell.com/support/viewContent.do?externalId=7010084 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 87%CPEs: 1EXPL: 0

Stack-based buffer overflow in the GetDriverSettings function in nipplib.dll in the iPrint client in Novell Open Enterprise Server 2 (aka OES2) SP3 allows remote attackers to execute arbitrary code via a long (1) hostname or (2) port field. Desbordamiento de búfer basado en la pila en la función GetDriverSettings en nipplib.dll en el cliente iPrint en Novell Open Enterprise Server 2 (también conocido como OES2) SP3 permite a atacantes remotos ejecutar código de su elección a través de (1) 'hostname' largo o (2) 'port field'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the nipplib.dll component. When handling the exposed method GetDriverSettings the application assembles a string for logging consisting of the hostname/port provided as a parameter. • http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117030.html http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html http://www.novell.com/support/viewContent.do?externalId=7009676 http://www.zerodayinitiative.com/advisories/ZDI-11-309 https://bugzilla.novell.com/show_bug.cgi?id=707730 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 93%CPEs: 2EXPL: 1

Multiple stack-based buffer overflows in opt/novell/iprint/bin/ipsmd in Novell iPrint for Linux Open Enterprise Server 2 SP2 and SP3 allow remote attackers to execute arbitrary code via unspecified LPR opcodes. Múltiples desbordamientos de búfer basados en pila en opt/novell/iPrint/bin/ipsmd en Novell iPrint para Linux Open Enterprise Server v2 SP2 y SP3 permiten a atacantes remotos ejecutar código de su elección a través de códigos de operación LPR no especificados. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability. The flaw exists within the '/opt/novell/iprint/bin/ipsmd' component this component communicates with 'ilprsrvd' which listens on TCP port 515. When handling multiple LPR opcodes the process blindly copies user supplied data into a fixed-length buffer on the stack. • https://www.exploit-db.com/exploits/16192 http://download.novell.com/Download?buildid=KloKR_CmrBs~ http://osvdb.org/70852 http://secunia.com/advisories/43281 http://securityreason.com/securityalert/8096 http://www.novell.com/support/viewContent.do?externalId=7007858&sliceId=1 http://www.securityfocus.com/archive/1/516506/100/0/threaded http://www.securityfocus.com/bid/46309 http://www.securitytracker.com/id?1025074 http://www.vupen.com/english/advisories/2011/0353 http://ww • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 1

The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon. multipath-tools en SUSE openSUSE v10.3 hasta v11.0 y SUSE Linux Enterprise Server (SLES) v10 utiliza permisos de escritura a todos para el fichero del socket (también conocido como /var/run/multipathd.sock), permitiendo a usuarios locales enviar comandos de su elección al demonio "multipath". • http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://launchpad.net/bugs/cve/2009-0115 http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html http://lists.vmware.com/pipermail/security-announce/2010/000082.html http://secunia.com/advisories/ • CWE-732: Incorrect Permission Assignment for Critical Resource •