Page 614 of 3075 results (0.019 seconds)

CVSS: 7.8EPSS: 8%CPEs: 8EXPL: 1

The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value. El controlador sfc (también conocido como Solarflare Solarstorm) en el Kernel de Linux anteriores a v3.2.30 permite a atacantes remotos provocar una denegación de servicio (consumo de descriptor de DMA y fallo del controlador de red) a través de paquetes TCP manipulados que provocan valores MSS pequeños. • http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00005.html http://rhn.redhat.com/errata/RHSA-2012-1323.html http://rhn.redhat.com/errata/RHSA-2012-1324.html http://rhn.redhat.com/errata/RHSA-2012-1347.html http://rhn.redhat.com/errata/RHSA-2012-1375.html http://rhn.redhat.com/errata/RHSA-2012-1401.html http://rhn.redhat.com/errata/RHSA-2012-1430.html http://secunia.com/advisories/50633 http://secunia.com/advisories/50732 http://secunia.com/advisori • CWE-189: Numeric Errors CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.9EPSS: 0%CPEs: 5EXPL: 0

The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping. La función rds_ib_xmit en net/rds/ib_send.c en la implementación fiable de datagramas de protocolo Sockets (RDS) en el kernel Linux v3.7.4 y anteriores permite a usuarios locales provocar una denegación de servicio (BUG_ON y el pánico del kernel) mediante el establecimiento de una conexión RDS con la dirección IP de origen igual a la dirección de la interfaz IPoIB IP propia, como lo demuestra rds-ping. • http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://rhn.redhat.com/errata/RHSA-2012-0743.html http://rhn.redhat.com/errata/RHSA-2012-1540.html http://ubuntu.com/usn/usn-1529-1 http://www.securityfocus.com/bid/54062 http://www.ubuntu.com/usn/USN-1555-1 http://www.ubuntu.com/usn/USN-1556-1 https://bugzilla.redhat.com/show_bug.cgi?id=822754 https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8 https://www.suse •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. Desbordamiento de buffer en la función glob de glibc para Red Hat Linux 6.2 a 7.2, y otros sistemas operativos, permite a atacantes causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrarios mediante un patrón de glob que acaba en una llave "{" • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000447 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-037-01 http://sources.redhat.com/ml/bug-glibc/2001-11/msg00109.html http://www.ciac.org/ciac/bulletins/m-029.shtml http://www.debian.org/security/2002/dsa-103 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-095.php3 http://www.linuxsecurity.com/advisories/other_advisory-1752.html http://www.redhat.com/support/errata/RHSA-2001-160&# •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

snmpd server in cmu-snmp SNMP package before 3.3-1 in Red Hat Linux 4.0 is configured to allow remote attackers to read and write sensitive information. • http://www.redhat.com/support/errata/rh40-errata-general.html#cmu-snmp https://exchange.xforce.ibmcloud.com/vulnerabilities/7251 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file. • http://marc.info/?l=bugtraq&m=88603844115233&w=2 http://www.debian.org/security/2003/dsa-308 http://www.iss.net/security_center/static/7241.php http://www.osvdb.org/3812 http://www.redhat.com/support/errata/rh50-errata-general.html#gzip http://www.securityfocus.com/bid/7845 •