
CVE-2014-3423 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3423
08 May 2014 — lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file. lisp/net/browse-url.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre un archivo /tmp/Mosaic.##### temporal. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks again... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-3421 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3421
08 May 2014 — lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file. lisp/gnus/gnus-fun.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre el archivo /tmp/gnus.face.ppm temporal. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks aga... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-3422 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3422
08 May 2014 — lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/. lisp/emacs-lisp/find-gc.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre un archivo temporal bajo /tmp/esrc/. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks ... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-0466 – Mandriva Linux Security Advisory 2014-076
https://notcve.org/view.php?id=CVE-2014-0466
01 Apr 2014 — The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file. El script fixps en a2ps 4.14 no utiliza la opción -dSAFER cuando ejecuta gs, lo que permite a atacantes dependientes de contexto eliminar archivos arbitrarios o ejecutar comandos arbitrarios a través de un archivo PostScript. Brian M. Carlson reported that a2ps's fixps script does not invoke gs with th... • http://lists.opensuse.org/opensuse-updates/2014-04/msg00021.html •

CVE-2001-1593 – Debian Security Advisory 2892-1
https://notcve.org/view.php?id=CVE-2001-1593
01 Apr 2014 — The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file. La función tempname_ensure en biblioteca lib/routines.h en a2ps versión 4.14 y anteriores, tal y como es usado por la función spy_user y otras posibles funciones, permite a usuarios locales modificar archivos arbitrarios en una ataque de tipo symlink en un archivo temporal. Several vulner... • http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2009-5138 – gnutls: incorrect handling of V1 intermediate certificates
https://notcve.org/view.php?id=CVE-2009-5138
03 Mar 2014 — GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959. GnuTLS anterior a 2.7.6, cuando el indicador GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT no está habilitado, trata certificados X.509 de versión 1 como CAs intermedios, lo que permite a at... • http://article.gmane.org/gmane.comp.security.oss.general/12223 • CWE-264: Permissions, Privileges, and Access Controls CWE-295: Improper Certificate Validation •

CVE-2014-0092 – gnutls: incorrect error handling in certificate verification (GNUTLS-SA-2014-2)
https://notcve.org/view.php?id=CVE-2014-0092
03 Mar 2014 — lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate. lib/x509/verify.c en GnuTLS anterior a 3.1.22 y 3.2.x anterior a 3.2.12 no maneja debidamente errores no especificados cuando verifica certificados X.509 de servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores a través de un certificad... • http://gnutls.org/security.html#GNUTLS-SA-2014-2 • CWE-295: Improper Certificate Validation CWE-310: Cryptographic Issues •

CVE-2014-1959 – Mandriva Linux Security Advisory 2014-043
https://notcve.org/view.php?id=CVE-2014-1959
20 Feb 2014 — lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates. lib/x509/verify.c en GnuTLS anterior a 3.1.21 y 3.2.x anterior a 3.2.11 trata certificados X.509 de versión 1 como CAs intermedios, lo que permite a atacantes remotos evadir restricciones mediante el aprovechamiento de un certificado X.509 V1 de... • http://seclists.org/oss-sec/2014/q1/344 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-3404 – glibc: incorrect size calculation in formatted printing can lead to FORTIFY_SOURCE format string protection bypass
https://notcve.org/view.php?id=CVE-2012-3404
10 Feb 2014 — The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.12 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (stack corruption and crash) via a format string that uses positional parameters and many format specifiers. La función vfprintf en stdio-common/vfprintf.c en libc en GNU C Library (también conocido como glibc) 2.12 y otra... • http://rhn.redhat.com/errata/RHSA-2012-1098.html • CWE-189: Numeric Errors •

CVE-2012-3405 – glibc: incorrect use of extend_alloca() in formatted printing can lead to FORTIFY_SOURCE format string protection bypass
https://notcve.org/view.php?id=CVE-2012-3405
10 Feb 2014 — The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers "desynchronization within the buffer size handling," a different vulnerability than CVE-2012-3404. La función vfprin... • http://rhn.redhat.com/errata/RHSA-2012-1098.html • CWE-189: Numeric Errors •