Page 35 of 200 results (0.011 seconds)

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

Buffer overflow in Open-source ARJ archiver 3.10.22 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ARJ archive. Desbordamiento de buffer en el archivador de código abierto ARJ 3.10.22 permite a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de un archivo ARJ manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/03/28/5 http://www.openwall.com/lists/oss-security/2015/03/29/1 http://www.securityfocus • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.8EPSS: 1%CPEs: 4EXPL: 3

Open-source ARJ archiver 3.10.22 allows remote attackers to conduct directory traversal attacks via a symlink attack in an ARJ archive. El archivador de código abierto ARJ 3.10.22 permite a atacantes remotos realizar ataques de salto de directorio a través de un ataque de enlace simbólico en un archivo ARJ. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/01/03/5 http://www.openwall.com/lists/oss-security/2015/01/05/9 http://www.securityfocus • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.8EPSS: 1%CPEs: 4EXPL: 1

Open-source ARJ archiver 3.10.22 does not properly remove leading slashes from paths, which allows remote attackers to conduct absolute path traversal attacks and write to arbitrary files via multiple leading slashes in a path in an ARJ archive. El archivador de código abierto ARJ 3.10.22 no elimina correctamente barras oblicuas de inicio de las rutas, lo que permite a atacantes remotos realizar ataques del recorrido del directorio absoluto y escribir a ficheros arbitrarios a través de múltiples barra oblicuas de inicio en una ruta en un archivo ARJ. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154518.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154605.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155011.html http://www.debian.org/security/2015/dsa-3213 http://www.mandriva.com/security/advisories?name=MDVSA-2015:201 http://www.openwall.com/lists/oss-security/2015/01/03/5 http://www.openwall.com/lists/oss-security/2015/01/05/9 http://www.securityfocus • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 10.0EPSS: 24%CPEs: 2EXPL: 5

The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name. La función get_rpm_nvr_by_file_path_temporary en util.py en setroubleshoot anterior a 3.2.22 permite a atacantes remotos ejecutar cpmandos arbitrarios a través de metacaracteres de shell en el nombre de un fichero. It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command. • https://www.exploit-db.com/exploits/36564 http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154427.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154444.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154147.html http://rhn.redhat.com/errata/RHSA-2015-0729.html http://www.openwall.com/lists/oss-security/2015/03/26/1 http://www.osvdb.org/119966 http://www.securityfocus.com/bid/73374 https://bugzilla.redhat.com/ • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

The get_user_grouplist function in the extdom plug-in in FreeIPA before 4.1.4 does not properly reallocate memory when processing user accounts, which allows remote attackers to cause a denial of service (crash) via a group list request for a user that belongs to a large number of groups. La función get_user_grouplist en el plug-in extdom en FreeIPA en versiones anteriores a 4.1.4 no reasigna memoria correctamente cuando procesa las cuentas de usuarios, lo que permite a atacantes remotos causar denegación de servicio (caída) a través de una solicitud de lista de grupo para un usuario que pertenece a un número grande de grupos. It was discovered that the IPA extdom Directory Server plug-in did not correctly perform memory reallocation when handling user account information. A request for a list of groups for a user that belongs to a large number of groups would cause a Directory Server to crash. • http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154314.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154103.html http://rhn.redhat.com/errata/RHSA-2015-0728.html http://www.securityfocus.com/bid/73376 https://bugzilla.redhat.com/show_bug.cgi?id=1205200 https://fedorahosted.org/freeipa/ticket/4908 https://access.redhat.com/security/cve/CVE-2015-1827 • CWE-19: Data Processing Errors CWE-131: Incorrect Calculation of Buffer Size •