Page 8 of 63 results (0.006 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The getipnodebyname() API in AIX 5.1 and 5.2 does not properly close sockets, which allows attackers to cause a denial of service (resource exhaustion). La API getipnodebyname() en AIX 5.1 y 5.2 no cierra adecuadamente los sockets, lo que permite a atacantes causar una denegación de servicio (agotamiento de recursos) • http://www.securityfocus.com/bid/8738 https://exchange.xforce.ibmcloud.com/vulnerabilities/13328 https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs?mode=7&heading=AIX51&topic=SECURITY&month=200310&label=getipnodebyname%28%29+API+does+not+close+sockets.&date=20031001&bulletin=datafile150755&embed=true •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in rcp for AIX 4.3.3, 5.1 and 5.2 allows local users to gain privileges. • http://secunia.com/advisories/10276 http://securitytracker.com/id?1008258 http://www-1.ibm.com/support/search.wss?rs=0&q=IY48272&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY48747&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY49238&apar=only http://www.securityfocus.com/bid/9078 •

CVSS: 4.3EPSS: 2%CPEs: 58EXPL: 0

ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value. ISC BIND 8.3.x antes de 8.3.7, y 8.4.x antes de 8.4.3 permite a atacantes remotos envenenar la cache mediante un servidor de nombres malicioso que devuelve respuestas negativas con un valor TTL (time to live) largo. • ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.33/CSSA-2003-SCO.33.txt http://secunia.com/advisories/10542 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57434 http://www.debian.org/security/2004/dsa-409 http://www.kb.cert.org/vuls/id/734644 http://www.trustix.org/errata/misc/2003/TSL-2003-0044-bind.asc.txt https://oval.cisecurity.org/repository& •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in lpd in the bos.rte.printers fileset for AIX 4.3 through 5.2, with debug enabled, allows local users to cause a denial of service (crash) or gain root privileges. Vulnerabilidad de cadena de formato en lpd en el conjunto de ficheros bos.rte.printers de AIX 4.3 a 5.2, con depuración activada, permite a usuarios locales causar una denegación de servicio (caída) o ganar privilegios de root. • http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2003.1605.1 http://www-1.ibm.com/support/search.wss?rs=0&q=IY45250&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY45344&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY46256&apar=only •

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in tsm for the bos.rte.security fileset on AIX 5.2 allows remote attackers to gain root privileges via login, and local users to gain privileges via login, su, or passwd, with a username that contains format string specifiers. Vulnerabilidad de cadena de formato en tsm del conjunto de ficheros bos.rte.security de AIZ 5.2 permite a atacantes remotos ganar privilegios de root mediante login, y a usuarios locales ganar privilegios mediante login, su o passwd, con un nombre de usuario que contenga especificadores de cadena de formato. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY47764&apar=only •