Page 3 of 30 results (0.026 seconds)

CVSS: 5.5EPSS: 0%CPEs: 13EXPL: 0

15 Sep 2020 — A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability. Se encontró un fallo de lectura de memoria fuera de límites en el kernel de Linux versiones anteriores a 5.9-rc2, con el sistema de archivos ext3/ext4, en la manera en que accede a un directorio con i... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14314 • CWE-125: Out-of-bounds Read •

CVSS: 7.1EPSS: 0%CPEs: 13EXPL: 0

19 Aug 2020 — In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. En el kernel de Linux versiones anteriores a 5.7.8, el archivo fs/nfsd/vfs.c (en el servidor NFS), puede establecer permisos incorrectos en nuevos objetos de un sistema de archivos cuando el sistema de archivos carece de soporte de ACL, también se conoce como CID-22cf84... • http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.3EPSS: 0%CPEs: 9EXPL: 0

28 May 2020 — In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua). En Vim versiones anteriores a 8.1.0881, los usuarios pueden omitir el modo restringido rvim y ejecutar comandos arbitrarios de Sistema Operativo por medio de interfaces de scripting (por ejemplo, Python, Ruby o Lua). A flaw was found in vim in the restricted mode, where all commands that make use of external shells are disabled. However, it was found ... • http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 2%CPEs: 19EXPL: 0

23 Oct 2018 — In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write. En mspack/cab.h en libmspack en versiones anteriores a la 0.8alpha y cabextract en versiones anteriores a la 1.8, el búfer de entrada de bloques CAB es un byte más pequeño para el bloque Quantum máximo, lo que conduce a una escritura fuera de límites. USN-3814-1 fixed several vulnerabilities in libmspack. In Ubuntu 14.04 li... • https://access.redhat.com/errata/RHSA-2019:2049 • CWE-787: Out-of-bounds Write •

CVSS: 4.3EPSS: 0%CPEs: 19EXPL: 1

23 Oct 2018 — chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name). chmd_read_headers en mspack/chmd.c en libmspack en versiones anteriores a la 0.8alpha acepta un nombre de archivo que tiene "\0" como su primer o segundo carácter (como el nombre "/\0"). Multiple vulnerabilities have been found in cabextract and libmspack, the worst of which could result in a Denial of Service. Versions less than 1.8 are affected. • https://access.redhat.com/errata/RHSA-2019:2049 • CWE-476: NULL Pointer Dereference •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 0

08 Oct 2018 — tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation. tinc en versiones anteriores a la 1.0.30 tiene un protocolo de autenticación roto, incluso sin una mitigación parcial. • http://tinc-vpn.org/security • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

08 Oct 2018 — tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1. tinc, desde la versión 1.0.30 hasta la 1.0.34 tiene un protocolo de autenticación roto, aunque hay una mitigación parcial. Esto se ha solucionado en la versión 1.1. Several vulnerabilities were discovered in tinc, a Virtual Private Network (VPN) daemon. • http://tinc-vpn.org/security • CWE-287: Improper Authentication •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

08 Oct 2018 — Missing message authentication in the meta-protocol in Tinc VPN version 1.0.34 and earlier allows a man-in-the-middle attack to disable the encryption of VPN packets. La falta de autenticación de mensajes en el protocolo meta en Tinc VPN en versiones 1.0.34 y anteriores permite que un ataque Man-in-the-Middle (MitM) deshabilite el cifrado de paquetes VPN. Several vulnerabilities were discovered in tinc, a Virtual Private Network (VPN) daemon. • http://tinc-vpn.org/security • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 1

10 Apr 2018 — An exploitable information disclosure vulnerability exists in the PCX image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted PCX image can cause an out-of-bounds read on the heap, resulting in information disclosure . An attacker can display a specially crafted image to trigger this vulnerability. Existe una vulnerabilidad explotable de divulgación de información en la funcionalidad de renderización de imágenes PCX de Simple DirectMedia Layer SDL2_image-2.0.2. Una im... • https://security.gentoo.org/glsa/201903-17 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 3%CPEs: 6EXPL: 1

10 Apr 2018 — An exploitable code execution vulnerability exists in the XCF image rendering functionality of Simple DirectMedia Layer SDL2_image-2.0.2. A specially crafted XCF image can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución de código en la funcionalidad de renderización de imágenes XCF de Simple DirectMedia Layer SDL2_image-2.0.2. Una imagen XCF especialmente ... • https://security.gentoo.org/glsa/201903-17 • CWE-787: Out-of-bounds Write •