
CVE-2013-4587 – Ubuntu Security Notice USN-2110-1
https://notcve.org/view.php?id=CVE-2013-4587
14 Dec 2013 — Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. Error de índice de array en la función kvm_vm_ioctl_create_vcpu en virt/kvm/kvm_main.c en el subsistema de KVM en el kernel de Linux hasta la versión 3.12.5 que permite a usuarios locales conseguir privilegios a través de un valor grande de id. Multiple vulnerabilities has been found and corrected in the Linux ke... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96 • CWE-20: Improper Input Validation •

CVE-2013-5611 – Ubuntu Security Notice USN-2052-1
https://notcve.org/view.php?id=CVE-2013-5611
11 Dec 2013 — Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation. Mozilla Firefox anterior a la versión 26.0 no elimina adecuadamente el doorhanger de la aplicación de instalación, lo que hace más sencillo para atancates remotos falsificar un sitio de instalación Web App mediante el control del tiempo de navegación por páginas. Ben Turner, Bobby Holley, Je... • http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123437.html •

CVE-2013-6420 – PHP - 'openssl_x509_parse()' Memory Corruption
https://notcve.org/view.php?id=CVE-2013-6420
11 Dec 2013 — The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function. La función asn1_time_to_time_t en ext / openssl / openssl.c en PHP anterior a 5.3.28, 5.4.x aterior a 5... • https://packetstorm.news/files/id/124436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-0425
https://notcve.org/view.php?id=CVE-2012-0425
02 Dec 2013 — LanItems.ycp in save_y2logs in yast2-network before 2.24.4 in SUSE YaST writes cleartext Wi-Fi credentials to the y2log log file, which allows context-dependent attackers to obtain sensitive information by reading the (1) WIRELESS_WPA_PASSWORD or (2) WIRELESS_CLIENT_KEY_PASSWORD field. LanItems.ycp en save_y2logs de yast2-network anterior a la versión 2.24.4 de SUSE YaST escribe credenciales Wi-Fi en texto plano en el archivo log de y2log, lo que permite a atacantes dependientes del contexto obtener informa... • https://bugzilla.novell.com/show_bug.cgi?id=752464 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2013-6712 – php: heap-based buffer over-read in DateInterval
https://notcve.org/view.php?id=CVE-2013-6712
28 Nov 2013 — The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification. La función de análisis en ext/date/lib/parse_iso_intervals.c de PHP hasta la versión 5.5.6 no restringe adecuadamente la creación de objetos DateInterval, lo que podría permitir a atacantes remotos provocar una denegación de servicio (desbord... • http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=12fe4e90be7bfa2a763197079f68f5568a14e071 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2013-4547 – Nginx 1.1.17 - URI Processing SecURIty Bypass
https://notcve.org/view.php?id=CVE-2013-4547
22 Nov 2013 — nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI. nginx 0.8.41 hasta la versión 1.4.3 y 1.5.x anterior a la versión 1.5.7 permite a atacantes remotos evadir restricciones intencionadas a través de un carácter de espacio sin escape en una URI. Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a spe... • https://www.exploit-db.com/exploits/38846 • CWE-116: Improper Encoding or Escaping of Output •

CVE-2013-0221 – GNU Coreutils 'sort' Text Utility - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2013-0221
21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU coreutils permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando sort, cuando se ... • https://www.exploit-db.com/exploits/38232 • CWE-20: Improper Input Validation CWE-665: Improper Initialization •

CVE-2013-0222 – coreutils: segfault in uniq with long line input
https://notcve.org/view.php?id=CVE-2013-0222
21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando uniq, lo que desencadena en un desbordamiento de búfer basado en p... • http://rhn.redhat.com/errata/RHSA-2013-1652.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-665: Improper Initialization •

CVE-2013-0223 – coreutils: segfault in "join -i" with long line input
https://notcve.org/view.php?id=CVE-2013-0223
21 Nov 2013 — The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function. SUSE coreutils-i18n.patch para GNU permite a atacantes dependientes del contexto provocar una denegación de servicio (caída y fallo de segmentación) a través de una cadena larga hacia el comando join, cuando se usa el switch -i, lo que... • http://rhn.redhat.com/errata/RHSA-2013-1652.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-665: Improper Initialization •

CVE-2013-1418 – krb5: multi-realm KDC null dereference leads to crash
https://notcve.org/view.php?id=CVE-2013-1418
16 Nov 2013 — The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. La función setup_server_realm en main.c en Key Distribution Center (KDC) de MIT Kerberos 5 (también conocido como krb5) anterior a la versión 1.10.7, cuando se configuran varios campos, permite a atacantes remotos provocar una deneg... • http://advisories.mageia.org/MGASA-2013-0335.html • CWE-476: NULL Pointer Dereference •