Page 4 of 34 results (0.003 seconds)

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in pppd on UnixWare 7.1.1 and Open UNIX 8.0.0 allows local users to gain root privileges via (1) ppptalk or (2) ppp, a different vulnerability than CVE-2002-0824. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.27/CSSA-2002-SCO.27.txt http://www.iss.net/security_center/static/9380.php http://www.securityfocus.com/bid/5051 •

CVSS: 7.2EPSS: 1%CPEs: 47EXPL: 0

CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. El servidor de bases de datos CDE ToolTalk (ttdbserver) permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque en enlaces simbólicos (symlink attack) en el fichero de registro (log) de transacciones usado por el procedimiento RPC _TT_TRANSACTION • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt ftp://patches.sgi.com/support/free/security/advisories/20021101-01-P http://archives.neohapsis.com/archives/aix/2002-q3/0002.html http://marc.info/?l=bugtraq&m=102635906423617&w=2 http://www.cert.org/advisories/CA-2002-20.html http://www.iss.net/security_center/static/9527.php http://www.kb.cert.org/vuls/id/299816 http://www.securityfocus.com/bid/5083 http://www1.itrc.hp •

CVSS: 7.5EPSS: 0%CPEs: 46EXPL: 0

CDE ToolTalk database server (ttdbserver) allows remote attackers to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure. El sevidor de bases de datos CDE ToolTalk (ttdbserver) permite a atacantes remotos sobrescribir posiciones arbitrarias de memoria con ceros, y posiblemente ganar privilegios, mediante un arguemnte de descriptor de fichero en una llamada al procedimiento AUTH_UNIX, que es usado como índice de tabla en el procedimiento _TT_ISCLOSE. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt ftp://patches.sgi.com/support/free/security/advisories/20021102-02-P http://marc.info/?l=bugtraq&m=102635906423617&w=2 http://www.cert.org/advisories/CA-2002-20.html http://www.kb.cert.org/vuls/id/975403 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1099 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15 https:/&#x •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in X11 library (libX11) on Caldera Open UNIX 8.0.0, UnixWare 7.1.1, and possibly other operating systems, allows local users to gain root privileges via a long -xrm argument to programs such as (1) dtterm or (2) xterm. Desbordamiento de búfer en la librería X11 (libX11) en Caldera Open UNIX 8.0.0, UnixWare 7.1.1 y posiblemente en otros sistemas operativos, permite a usuarios locales ganar privilegios de root mediante un argumento -xrm largo en programas como (1)dtterm o (2) xterm. • ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.15/CSSA-2002-SCO.15.txt http://archives.neohapsis.com/archives/bugtraq/2002-01/0099.html http://www.iss.net/security_center/static/7282.php http://www.iss.net/security_center/static/8828.php http://www.kb.cert.org/vuls/id/169059 http://www.securityfocus.com/archive/1/249106 http://www.securityfocus.com/bid/4502 •