Page 7 of 159 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

The upgrade of IRIX on Origin 3000 to 6.5.13 through 6.5.16 changes the MAC address of the system, which could modify intended access restrictions that are based on a MAC address. La actualización de IRIX en Origin 3000 de la 6.5.13 a la 6.5.16 cambia la dirección MAC del sistema, lo que podría modificar las restricciones de acceso establecidas que se basan en la dirección MAC. • ftp://patches.sgi.com/support/free/security/advisories/20020805-01-I http://www.iss.net/security_center/static/9868.php http://www.securityfocus.com/bid/5467 •

CVSS: 4.6EPSS: 0%CPEs: 24EXPL: 0

fsr_efs in IRIX 6.5 allows local users to conduct unauthorized file activities via a symlink attack, possibly via the .fsrlast file. fsr_efs en IRIX 6.5 permite a usuarios locales llevar a cabo actividades no autorizadas con ficheros mediante un ataque de enlace simbólico (symlink), posiblemente mediante el fichero .fsrlast • ftp://patches.sgi.com/support/free/security/advisories/20020903-01-P ftp://patches.sgi.com/support/free/security/advisories/20020903-02-P ftp://patches.sgi.com/support/free/security/advisories/20021103-01-P ftp://patches.sgi.com/support/free/security/advisories/20021103-02-P http://www.ciac.org/ciac/bulletins/n-004.shtml http://www.iss.net/security_center/static/10275.php http://www.osvdb.org/8579 http://www.securityfocus.com/bid/5897 •

CVSS: 3.6EPSS: 0%CPEs: 23EXPL: 0

mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories. mv en IRIX 6.5 crea un directorio con permisos de escritura para todo el mundo mientras mueve un directorio, lo que podría permitir a usuarios locales modificar ficheros y directorios. • ftp://patches.sgi.com/support/free/security/advisories/20020903-01-P http://www.ciac.org/ciac/bulletins/n-004.shtml http://www.iss.net/security_center/static/10276.php http://www.osvdb.org/8580 http://www.securityfocus.com/bid/5893 •

CVSS: 4.6EPSS: 0%CPEs: 23EXPL: 0

rpcbind in SGI IRIX, when using the -w command line switch, allows local users to overwrite arbitrary files via a symlink attack. • ftp://patches.sgi.com/support/free/security/advisories/20020903-01-P http://www.ciac.org/ciac/bulletins/n-004.shtml http://www.iss.net/security_center/static/10272.php http://www.securityfocus.com/bid/5889 •

CVSS: 7.5EPSS: 96%CPEs: 165EXPL: 1

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. Desbordamiento de entero en la función xdrmem_getbytes(), y posiblemente otras funciones, de librerias XDR (representación de datos externos) derivadas de SunRPC, incluyendo libnsl, libc y glibc permite a atacantes remotos ejecutar código arbitrario mediante ciertos valores enteros en campos de longitud. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-008.txt.asc http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0140.html http://marc.info/?l=bugtraq&m=104810574423662&w=2 http://marc.info/?l=bugtraq&m=104811415301340&w=2 http://marc.info/?l=bugtraq&m=104860855114117&w=2 http://marc.info/?l=bugtraq&m=104878237121402&w=2 http://marc.info/? •