Page 36 of 1101 results (0.014 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

23 Jul 2019 — GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) is affected by: Improper Input Validation, Signed/Unsigned Comparison, Out-of-bounds Read. The impact is: Denial of service. The component is: gold/fileread.cc:497, elfcpp/elfcpp_file.h:644. The attack vector is: An ELF file with an invalid e_shoff header field must be opened. GNU binutils gold gold v1.11-v1.16 (GNU binutils v2.21-v2.31.1) está afectado por: Validación incorrecta de entrada, comparación firmada / sin firmar, lectura fuera de lí... • https://security.netapp.com/advisory/ntap-20190822-0001 • CWE-125: Out-of-bounds Read CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 5.9EPSS: 1%CPEs: 1EXPL: 1

17 Jul 2019 — In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c. En GNU parche hasta 2.7.6, el seguimiento de los enlaces simbólicos es manejado inapropiadamente en determinados casos diferentes a los archivos de entrada. Esto afecta a los archivos inp.c y util.c. USN-4071-1 fixed several vulnerabilities in Patch. • https://packetstorm.news/files/id/154124 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability. ** EN DISPUTA **La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. El impacto es: el atacante puede adivinar las direcciones heap del subproceso (hilo) pthread_created. • https://security-tracker.debian.org/tracker/CVE-2019-1010025 • CWE-330: Use of Insufficiently Random Values •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

15 Jul 2019 — GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La corriente de GNU Libc está afectada por: Re-asignación de la biblioteca cargada actual con un archivo ELF mali... • http://www.securityfocus.com/bid/109167 •

CVSS: 5.3EPSS: 2%CPEs: 1EXPL: 1

15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. El impacto es que: el atacante puede omitir la funcionalidad ASLR utilizando la caché del subproceso (hilo) stack y heap. • http://www.securityfocus.com/bid/109162 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

15 Jul 2019 — GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat. ** EN DISPUTA ** La biblioteca Libc actual de GNU está afectada por: Omisión de Mitigación. • https://security-tracker.debian.org/tracker/CVE-2019-1010022 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

26 Jun 2019 — An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. There is a heap-based buffer over-read in _bfd_doprnt in bfd.c because elf_object_p in elfcode.h mishandles an e_shstrndx section of type SHT_GROUP by omitting a trailing '\0' character. Fue encontrado un problema en la biblioteca Binary File Descriptor (BFD), también conocida como libbfd, tal y como se distribuye en GNU Binutils 2.32. Se ha descubierto un problema en las versiones 0.7 y 0.... • http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

18 Jun 2019 — A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may use this flaw to crash a script or execute code with the privileges of the bash process. This occurs because ansicstr() in lib/sh/strtrans.c mishandles u32cconv(). Existe un desbordamiento de búfer basado en el h... • http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

22 May 2019 — stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. stack_protec... • https://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup • CWE-209: Generation of Error Message Containing Sensitive Information •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

01 May 2019 — An issue was discovered in GNU recutils 1.8. There is a heap-based buffer overflow in the function rec_fex_parse_str_simple at rec-fex.c in librec.a. Se descubrió un problema en GNU recutils versión 1.8. Hay un desbordamiento de búfer basado en memoria dinámica (heap) en la función rec_fex_parse_str_simple en rec-fex.c en librec.a. It was discovered that recutils incorrectly handled memory when parsing comments with the recparser utility. • https://github.com/TeamSeri0us/pocs/blob/master/recutils/bug-report-recutils • CWE-787: Out-of-bounds Write •