Page 4 of 60 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 10EXPL: 0

pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver. pam_ldap en nss_ldap sobre Red Hat Enterprise Linux 4, Fedora Core 3 y anteriores, y posiblemente otras distribuciones no devuelven una condición de error cuando un servidor de directorio LDAP responde con una respuesta de control PasswordPolicyResponse, lo cual provoca que la función pam_authenticate devuelva código correcto aunque haya fallado, según lo divulgado originalmente para el xscreensaver. • http://bugzilla.padl.com/show_bug.cgi?id=291 http://rhn.redhat.com/errata/RHSA-2006-0719.html http://secunia.com/advisories/22682 http://secunia.com/advisories/22685 http://secunia.com/advisories/22694 http://secunia.com/advisories/22696 http://secunia.com/advisories/22869 http://secunia.com/advisories/23132 http://secunia.com/advisories/23428 http://security.gentoo.org/glsa/glsa-200612-19.xml http://securitytracker.com/id?1017153 http://www.debian.org/security/2006 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Multiple memory leaks in the LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (memory consumption) via invalid BER packets that trigger an error, which might prevent memory from being freed if it was allocated during the ber_scanf call, as demonstrated using the ProtoVer LDAP test suite. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135 http://secunia.com/advisories/18960 http://www.securityfocus.com/bid/16677 https://exchange.xforce.ibmcloud.com/vulnerabilities/24794 https://access.redhat.com/security/cve/CVE-2006-0451 https://bugzilla.redhat.com/show_bug.cgi?id=179135 •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

The LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (crash) via a certain "bad BER sequence" that results in a free of uninitialized memory, as demonstrated using the ProtoVer LDAP test suite. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135 http://secunia.com/advisories/18960 http://www.securityfocus.com/bid/16677 https://exchange.xforce.ibmcloud.com/vulnerabilities/24795 https://access.redhat.com/security/cve/CVE-2006-0453 https://bugzilla.redhat.com/show_bug.cgi?id=1617999 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

dn2ancestor in the LDAP component in Fedora Directory Server 1.0 allows remote attackers to cause a denial of service (CPU and memory consumption) via a ModDN operation with a DN that contains a large number of "," (comma) characters, which results in a large amount of recursion, as demonstrated using the ProtoVer LDAP test suite. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179137 http://secunia.com/advisories/18960 http://www.securityfocus.com/bid/16677 https://exchange.xforce.ibmcloud.com/vulnerabilities/24796 https://access.redhat.com/security/cve/CVE-2006-0452 https://bugzilla.redhat.com/show_bug.cgi?id=179137 •