Page 535 of 2946 results (0.013 seconds)

CVSS: 9.3EPSS: 92%CPEs: 6EXPL: 0

Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. Condición de carrera en el manejador de señal OpenSSH en versiones anteriores a 4.4 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario si la autenticación GSSAPI está habilitada, a través de vectores no especificados que conducen a una doble liberación. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:22.openssh.asc ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://lists.freebsd.org/pipermail/freebsd-security/2006-October/004051.html http://marc.info/?l=openssh-unix-dev&m=115939141729160&w=2 http://openssh.org/txt/release-4.4 http://secunia.com/advisories& • CWE-415: Double Free •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Heap-based buffer overflow in the AirPort wireless driver on Apple Mac OS X 10.4.7 allows physically proximate attackers to cause a denial of service (crash), gain privileges, and execute arbitrary code via a crafted frame that is not properly handled during scan cache updates. Desbordamiento de búfer basado en montón en el controlador wireless AirPort en Apple Mac OS X 10.4.7 permite a atacantes físicamente próximos provocar una denegación de servicio (caída), obteniendo privilegios, y ejecutando código de su elección mediante una trama artesanal que no es manejada adecuadamente durante las actualizaciones de escaneo de cache. • http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html http://secunia.com/advisories/22068 http://securitytracker.com/id?1016903 http://www.kb.cert.org/vuls/id/589540 http://www.securityfocus.com/bid/20144 http://www.vupen.com/english/advisories/2006/3737 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Integer overflow in the API for the AirPort wireless driver on Apple Mac OS X 10.4.7 might allow physically proximate attackers to cause a denial of service (crash) or execute arbitrary code in third-party wireless software that uses the API via crafted frames. Desbordamiento de enteros en la API para el controlador de AirPort Wireless sobre Apple Mac OS X 10.4.7 que permitirían a un atacante cercano fisicamente provocar denegación de serivicio(caida) o ejecutar código de su elección con un software de terceros que utiliza el API a través de marcos artesanales. • http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html http://secunia.com/advisories/22068 http://securitytracker.com/id?1016903 http://www.kb.cert.org/vuls/id/563492 http://www.securityfocus.com/bid/20144 http://www.vupen.com/english/advisories/2006/3737 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Multiple stack-based buffer overflows in the AirPort wireless driver on Apple Mac OS X 10.3.9 and 10.4.7 allow physically proximate attackers to execute arbitrary code by injecting crafted frames into a wireless network. Múltiples desbordamientos de búfer basados en pila en el controlador wireless AirPort en Apple Mac OS X 10.3.9 y 10.4.7 permiten a atacantes físicamente próximos ejecutar código de su elección inyectando tramas artesanales dentro de la red wireless. • https://www.exploit-db.com/exploits/28643 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00001.html http://secunia.com/advisories/22068 http://securitytracker.com/id?1016903 http://www.kb.cert.org/vuls/id/867796 http://www.securityfocus.com/bid/20144 http://www.vupen.com/english/advisories/2006/3737 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Apple Remote Desktop (ARD) for Mac OS X 10.2.8 and later does not drop privileges on the remote machine while installing certain applications, which allows local users to bypass authentication and gain privileges by selecting the icon during installation. NOTE: it could be argued that the issue is not in Remote Desktop itself, but in applications that are installed while using it. Apple Remote Desktop (ARD) para Mac OS X 10.2.8 y posteriores no quita privilegios en la máquina remota al instalar ciertas aplicaciones, lo cual permite a usuarios locales evitar la autenticación y obtener privilegios seleccionando el icono durante la instalación. NOTA: Se podría discutir que esta vulnerabilidad no se produce en el mismo Remote Desktop, si no en aplicaciones que son instaladas cuando se está usando. • http://www.osvdb.org/32260 http://www.securityfocus.com/archive/1/446371/100/0/threaded http://www.securityfocus.com/archive/1/446751/100/0/threaded http://www.securityfocus.com/archive/1/447043/100/0/threaded http://www.securityfocus.com/bid/20092 https://exchange.xforce.ibmcloud.com/vulnerabilities/29060 •