Page 75 of 982 results (0.009 seconds)

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen. Xen versiones hasta 4.14.x, permite a administradores de Sistemas Operativos invitados obtener información confidencial (tales como claves AES desde fuera del invitado) por medio de un ataque de canal lateral en una interfaz de monitoreo de power/energy, también se conoce como un ataque "Platypus". NOTA: solo existe una corrección lógicamente independiente: cambiar el control de acceso para cada interfaz de este tipo en Xen • http://www.openwall.com/lists/oss-security/2020/11/26/1 http://xenbits.xen.org/xsa/advisory-351.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5J66QUUHXH2RR4CNCKQRGVXVSOUFRPDA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV23EZIMNLJN4YXRRXLQV2ALW6ZEALXV https://platypusattack.com https://www.debian.org/security/2020/dsa-4804 https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus https:&# • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

In exif_entry_get_value of exif-entry.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if a third party app used this library to process remote image data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11 Android-8.0Android ID: A-159625731 En la función exif_entry_get_value del archivo exif-entry.c, se presenta una posible escritura fuera de límites debido a un desbordamiento de enteros. Esto podría conllevar a una ejecución de código remota si una aplicación de terceros usa esta biblioteca procesa datos remotos de imágenes sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7 https://security.gentoo.org/glsa/202011-19 https://source.android.com/security/bulletin/2020-11-01 https://access.redhat.com/security/cve/CVE-2020-0452 https://bugzilla.redhat.com/show_bug.cgi?id=1902004 • CWE-190: Integer Overflow or Wraparound CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 0

A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution. Se abordó un problema de uso de la memoria previamente liberada, con una administración de la memoria mejorada. Este problema se corrigió en macOS Big Sur versión 11.0.1, watchOS versión 7.1, iOS versión 14.2 y iPadOS versión 14.2, iCloud para Windows versión 11.5, Safari versión 14.0.1, tvOS versión 14.2, iTunes versión 12.11 para Windows. • http://seclists.org/fulldisclosure/2020/Dec/32 http://www.openwall.com/lists/oss-security/2021/03/22/1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EQ3U3VBSOJB46WCO66TEWE5OAXLTU3YW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU https://security.gentoo.org/glsa/202104-03 https:// • CWE-416: Use After Free •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 1

raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml). La función raptor_xml_writer_start_element_common en el archivo raptor_xml_writer.c en Raptor RDF Syntax Library versión 2.0.15, calcula inapropiadamente las declaraciones máximas nspace para el escritor XML, conllevando a desbordamientos del búfer en la región heap de la memoria (algunas veces se ve en la función raptor_qname_format_as_xml) • http://www.openwall.com/lists/oss-security/2020/11/13/1 http://www.openwall.com/lists/oss-security/2020/11/13/2 http://www.openwall.com/lists/oss-security/2020/11/14/2 http://www.openwall.com/lists/oss-security/2020/11/16/2 http://www.openwall.com/lists/oss-security/2020/11/16/3 https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1 https://lists.debian.org/debian-lts-announce& • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 1

libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c. libmaxminddb versiones anteriores a 1.4.3, presenta una lectura excesiva del búfer en la región heap de la memoria en la función dump_entry_data_list en el archivo maxminddb.c An improper initialization issue was found in libmaxminddb. A remote user could exploit this flaw by sending a specially crafted MaxMind DB file that, when parsed by an application linked to libmaxminddb, would possibly crash the application, resulting in a denial of service condition. • https://github.com/maxmind/libmaxminddb/compare/1.4.2...1.4.3 https://github.com/maxmind/libmaxminddb/issues/236 https://github.com/maxmind/libmaxminddb/pull/237 https://lists.debian.org/debian-lts-announce/2020/11/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WUK4UCOB5FJVK36E22IRLEYGKMUWGBG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELTOHZBPO6XVUVADP4DPZBNQCPTYOQBV https://security.gentoo.org/glsa/ • CWE-122: Heap-based Buffer Overflow CWE-125: Out-of-bounds Read •