Page 7 of 33 results (0.000 seconds)

CVSS: 4.3EPSS: 6%CPEs: 4EXPL: 0

Race condition in fileserver in OpenAFS 1.3.50 through 1.4.5 and 1.5.0 through 1.5.27 allows remote attackers to cause a denial of service (daemon crash) by simultaneously acquiring and giving back file callbacks, which causes the handler for the GiveUpAllCallBacks RPC to perform linked-list operations without the host_glock lock. Condición de carrera en el servidor de ficheros de OpenAFS 1.3.50 hasta 1.4.5 y 1.5.0 hasta 1.5.27 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) al adquirir simultáneamente y devolver llamadas a ficheros, lo cual provoca que el gestor de GiveUpAllCallBacks RPC realice operaciones de listas enlazadas sin el bloqueo host_glock. • http://lists.openafs.org/pipermail/openafs-announce/2007/000220.html http://secunia.com/advisories/28327 http://secunia.com/advisories/28401 http://secunia.com/advisories/28433 http://secunia.com/advisories/28636 http://security.gentoo.org/glsa/glsa-200801-04.xml http://www.debian.org/security/2008/dsa-1458 http://www.mandriva.com/security/advisories?name=MDVSA-2008:207 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.openafs.org/securi • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.5EPSS: 3%CPEs: 21EXPL: 0

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache. La configuración predeterminada en OpenAFS versiones 1.4.x anteriores a 1.4.4 y versiones 1.5.x anteriores a 1.5.17, admite programas setuid dentro de la celda local, lo que podría permitir a atacantes alcanzar privilegios suplantando una respuesta a una petición FetchStatus del administrador de caché AFS y establecer la propiedad de setuid y root para archivos en la memoria caché. • http://secunia.com/advisories/24582 http://secunia.com/advisories/24599 http://secunia.com/advisories/24607 http://secunia.com/advisories/24720 http://security.gentoo.org/glsa/glsa-200704-03.xml http://www.debian.org/security/2007/dsa-1271 http://www.mandriva.com/security/advisories?name=MDKSA-2007:066 http://www.openafs.org/pipermail/openafs-announce/2007/000185.html http://www.openafs.org/pipermail/openafs-announce/2007/000186.html http://www.openafs.org/pipermail/openafs-anno • CWE-16: Configuration •

CVSS: 7.5EPSS: 96%CPEs: 165EXPL: 1

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. Desbordamiento de entero en la función xdrmem_getbytes(), y posiblemente otras funciones, de librerias XDR (representación de datos externos) derivadas de SunRPC, incluyendo libnsl, libc y glibc permite a atacantes remotos ejecutar código arbitrario mediante ciertos valores enteros en campos de longitud. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-008.txt.asc http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0140.html http://marc.info/?l=bugtraq&m=104810574423662&w=2 http://marc.info/?l=bugtraq&m=104811415301340&w=2 http://marc.info/?l=bugtraq&m=104860855114117&w=2 http://marc.info/?l=bugtraq&m=104878237121402&w=2 http://marc.info/? •