Page 4 of 21 results (0.010 seconds)

CVSS: 7.5EPSS: 13%CPEs: 3EXPL: 0

Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion. Desbordamiento de búfer basado en la pila en vfs_s_resolve_symlink de vfs/direntry.c en Midnight Commander (mc) 4.6.0 y anteriores, y posiblemente otras versiones permite a atacantes remotos ejecutar código arbitrario durante una conversión de enlaces simbólicos (symlink). • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-014.0.txt ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://archive.cert.uni-stuttgart.de/bugtraq/2003/09/msg00309.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000833 http://fedoranews.org/updates/FEDORA-2004-058.shtml http://marc.info/?l=bugtraq&m=108118433222764&w=2 http://rhn.redhat.com/errata&#x •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in mcedit in Midnight Commander 4.5.1 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted text file. • http://www.kb.cert.org/vuls/id/203203 https://exchange.xforce.ibmcloud.com/vulnerabilities/10630 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Midnight Commander (mc) 4.5.51 and earlier does not properly process malformed directory names when a user opens a directory, which allows other local users to gain privileges by creating directories that contain special characters followed by the commands to be executed. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0373.html http://www.debian.org/security/2001/dsa-036 http://www.novell.com/linux/security/advisories/2001_011_mc.html http://www.securityfocus.com/bid/2016 https://exchange.xforce.ibmcloud.com/vulnerabilities/5929 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

cons.saver in Midnight Commander (mc) 4.5.42 and earlier does not properly verify if an output file descriptor is a TTY, which allows local users to corrupt files by creating a symbolic link to the target file, calling mc, and specifying that link as a TTY argument. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0192.html http://www.debian.org/security/2000/20001125 http://www.linux-mandrake.com/en/security/MDKSA-2000-078.php3 http://www.securityfocus.com/bid/1945 https://exchange.xforce.ibmcloud.com/vulnerabilities/5519 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

FTP client in Midnight Commander (mc) before 4.5.11 stores usernames and passwords for visited sites in plaintext in the world-readable history file, which allows other local users to gain privileges. • http://marc.info/?l=bugtraq&m=93370073207984&w=2 http://www.iss.net/security_center/static/9873.php http://www.osvdb.org/5921 •