Page 48 of 364 results (0.009 seconds)

CVSS: 9.3EPSS: 15%CPEs: 23EXPL: 0

Multiple format string vulnerabilities in snoop on Sun Solaris 8 through 10 and OpenSolaris before snv_96, when the -o option is omitted, allow remote attackers to execute arbitrary code via format string specifiers in an SMB packet. Múltiples vulnerabilidades de cadena de formato en snoop sobre Sun Solaris versión 8 hasta 10 y OpenSolaris anterior a la versión snv_96, cuando se omite la opción -o, permiten a los atacantes remotos ejecutar código arbitrario por medio de especificadores de cadena de formato en un paquete SMB. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=735 http://secunia.com/advisories/31386 http://secunia.com/advisories/31535 http://sunsolve.sun.com/search/document.do?assetkey=1-26-240101-1 http://support.avaya.com/elmodocs2/security/ASA-2008-355.htm http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=766935 http://www.securityfocus.com/bid/30556 http://www.securitytracker.com/id?1020633 http://www.vupen.com/english/advisories/2008/2311 https://exchang • CWE-134: Use of Externally-Controlled Format String •

CVSS: 4.7EPSS: 0%CPEs: 24EXPL: 0

Unspecified vulnerability in the pthread_mutex_reltimedlock_np API in Sun Solaris 10 and OpenSolaris before snv_90 allows local users to cause a denial of service (system hang or panic) via unknown vectors. Vulnerabilidad no especificada en la API pthread_mutex_reltimedlock_np de Sun Solaris 10 y OpenSolaris versiones anteriores a la snv_90, permite a usuarios locales provocar una denegación de servicio (cuelgue del sistema o panic) a través de vectores desconocidos. • http://secunia.com/advisories/31348 http://sunsolve.sun.com/search/document.do?assetkey=1-66-239387-1 http://www.securityfocus.com/bid/30561 http://www.securitytracker.com/id?1020634 http://www.vupen.com/english/advisories/2008/2312 https://exchange.xforce.ibmcloud.com/vulnerabilities/44224 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5446 • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 0

Unspecified vulnerability in the Solaris Platform Information and Control Library daemon (picld) in Sun Solaris 8 through 10, and OpenSolaris builds snv_01 through snv_95, allows local users to cause a denial of service via unknown vectors that prevent operation of utilities such as prtdiag, prtpicl, and prtfru. Vulnerabilidad no especificada del demonio Solaris Platform Information and Control Library daemon (picld) en Sun Solaris versión 8 hasta la 10, y OpenSolaris builds versión snv_01 hasta la snv_95, permite a usuarios locales provocar una denegación de servicio a través de vectores desconocidos que impiden operaciones con utilidades como prtdiag, prtpicl, y prtfru. • http://secunia.com/advisories/31303 http://secunia.com/advisories/31501 http://sunsolve.sun.com/search/document.do?assetkey=1-26-239728-1 http://support.avaya.com/elmodocs2/security/ASA-2008-351.htm http://www.securityfocus.com/bid/30450 http://www.securitytracker.com/id?1020609 http://www.vupen.com/english/advisories/2008/2262/references https://exchange.xforce.ibmcloud.com/vulnerabilities/44117 •

CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0

The SNMP-DMI mapper subagent daemon (aka snmpXdmid) in Solstice Enterprise Agents in Sun Solaris 8 through 10 allows remote attackers to cause a denial of service (daemon crash) via malformed packets. Subagente mapeador SNMP-DNI (aka snmpXdmid) en Solstice Enterprise Agents en Sun Solaris 8 hasta 10 permite a atacantes remotos causar la denegación e servicios (caída del demonio) a través de paquetes malformados • http://secunia.com/advisories/30863 http://sunsolve.sun.com/search/document.do?assetkey=1-26-237985-1 http://www.securityfocus.com/bid/29965 http://www.securitytracker.com/id?1020381 http://www.vupen.com/english/advisories/2008/1965/references • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 1

Integer signedness error in the ip_set_srcfilter function in the IP Multicast Filter in uts/common/inet/ip/ip_multi.c in the kernel in Sun Solaris 10 and OpenSolaris before snv_92 allows local users to execute arbitrary code in other Solaris Zones via an SIOCSIPMSFILTER IOCTL request with a large value of the imsf->imsf_numsrc field, which triggers an out-of-bounds write of kernel memory. NOTE: this was reported as an integer overflow, but the root cause involves the bypass of a signed comparison. Error de presencia de signo entero en la función ip_set_srcfilter en el IP Multicast Filter en uts/common/inet/ip/ip_multi.c en el kernel de Sun Solaris 10 y OpenSolaris anterior a snv_92, permite a usuarios locales ejecutar código de su elección en otras "Solaris Zones" a través de una petición SIOCSIPMSFILTER IOCTL con un valor largo del campo imsf->imsf_numsrc, que dispara una escritura de memoria del kernel fuera de rango. NOTA: esto ha sido reportado como un desbordamiento de entero, pero el origen del problema implica una comparación de signo que no se realiza. • http://secunia.com/advisories/30693 http://sunsolve.sun.com/search/document.do?assetkey=1-26-237965-1 http://www.securityfocus.com/bid/29699 http://www.securitytracker.com/id?1020283 http://www.trapkit.de/advisories/TKADV2008-003.txt http://www.vupen.com/english/advisories/2008/1832/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43068 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5731 • CWE-189: Numeric Errors •