CVE-2023-40235
https://notcve.org/view.php?id=CVE-2023-40235
An NTLM Hash Disclosure was discovered in ArchiMate Archi before 5.1.0. When parsing the XMLNS value of an ArchiMate project file, if the namespace does not match the expected ArchiMate URL, the parser will access the provided resource. If the provided resource is a UNC path pointing to a share server that does not accept a guest account, the host will try to authenticate on the share by using the current user's session. NOTE: this issue occurs because Archi uses an unsafe configuration of the Eclipse Modeling Framework. • https://github.com/archimatetool/archi/commit/bcab676beddfbeddffecacf755b6692f0b0151f1 https://github.com/archimatetool/archi/compare/release_5.0.2...release_5.1.0 https://github.com/archimatetool/archi/issues/946 https://github.com/eclipse-emf/org.eclipse.emf/issues/8 •
CVE-2023-24039
https://notcve.org/view.php?id=CVE-2023-24039
A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Los usuarios locales con pocos privilegios pueden aprovechar un desbordamiento de búfer en la región stack de la memoria en ParseColors en libXm en Common Desktop Environment 1.6 a través del binario dtprintinfo setuid para escalar sus privilegios a root en sistemas Solaris 10. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. • http://seclists.org/fulldisclosure/2023/Jan/24 https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt https://security.humanativaspa.it/nothing-new-under-the-sun • CWE-787: Out-of-bounds Write •
CVE-2023-24040
https://notcve.org/view.php?id=CVE-2023-24040
dtprintinfo in Common Desktop Environment 1.6 has a bug in the parser of lpstat (an invoked external command) during listing of the names of available printers. This allows low-privileged local users to inject arbitrary printer names via the $HOME/.printers file. This injection allows those users to manipulate the control flow and disclose memory contents on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. dtprintinfo en Common Desktop Environment 1.6 tiene un error en el analizador de lpstat (un comando externo invocado) durante la lista de nombres de impresoras disponibles. Esto permite a los usuarios locales con pocos privilegios inyectar nombres de impresoras arbitrarios a través del archivo $HOME/.printers. • http://seclists.org/fulldisclosure/2023/Jan/24 https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt https://security.humanativaspa.it/nothing-new-under-the-sun • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2022-45461
https://notcve.org/view.php?id=CVE-2022-45461
The Java Admin Console in Veritas NetBackup through 10.1 and related Veritas products on Linux and UNIX allows authenticated non-root users (that have been explicitly added to the auth.conf file) to execute arbitrary commands as root. La Consola de administración de Java en Veritas NetBackup hasta 10.1 y productos Veritas relacionados en Linux y UNIX permite a usuarios no root autenticados (que se han agregado explícitamente al archivo auth.conf) ejecutar comandos arbitrarios como root. • https://www.veritas.com/content/support/en_US/security/VTS22-015 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2022-30984
https://notcve.org/view.php?id=CVE-2022-30984
A buffer overflow vulnerability in the Rubrik Backup Service (RBS) Agent for Linux or Unix-based systems in Rubrik CDM 7.0.1, 7.0.1-p1, 7.0.1-p2 or 7.0.1-p3 before CDM 7.0.2-p2 could allow a local attacker to obtain root privileges by sending a crafted message to the RBS agent. Una vulnerabilidad de desbordamiento de búfer en el agente de Rubrik Backup Service (RBS) para sistemas basados en Linux o Unix en Rubrik CDM versiones 7.0.1, 7.0.1-p1, 7.0.1-p2 o 7.0.1-p3 anteriores a CDM 7.0.2-p2, podría permitir a un atacante local obtener privilegios de root mediante el envío de un mensaje diseñado al agente RBS. • https://rubrik.com https://www.rubrik.com/advisories/rbk-20220705-V0037 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •