Page 8 of 106 results (0.020 seconds)

CVSS: 4.7EPSS: 0%CPEs: 157EXPL: 2

Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x. Una condición de carrera en el soporte de ptrace and utrace en el kernel de Linux versión 2.6.9 hasta 2.6.25, tal y como es usado en Red Hat Enterprise Linux (RHEL) versión 4, permite a los usuarios locales causar una denegación de servicio (oops) por medio de una larga serie de llamadas ptrace de PTRACE_ATTACH hacia otros procesos de usuario que desencadena un conflicto entre utrace_detach y report_quiescent, relacionado con "late ptrace_may_attach() check" y "race around &dead_engine_ops setting," una vulnerabilidad diferente de los CVE-2007-0771 y CVE-2008-1514. NOTA: este problema solo puede afectar a las versiones del kernel anterior a 2.6.16.x. • https://www.exploit-db.com/exploits/31965 https://www.exploit-db.com/exploits/31966 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=5ecfbae093f0c37311e89b29bfc0c9d586eace87 http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f358166a9405e4f1d8e50d8f415c26d95505b6de http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f5b40e363ad6041a96e3da32281d8faa191597b9 http://marc.info/?l=linux-kernel&m=1 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Untrusted search path vulnerability in a certain Red Hat build script for Standards Based Linux Instrumentation for Manageability (sblim) libraries before 1-13a.el4_6.1 in Red Hat Enterprise Linux (RHEL) 4, and before 1-31.el5_2.1 in RHEL 5, allows local users to gain privileges via a malicious library in a certain subdirectory of /var/tmp, related to an incorrect RPATH setting, as demonstrated by a malicious libc.so library for tog-pegasus. Vulnerabilidad de búsqueda de ruta no confiable en ciertas secuencias de comandos web usadas para "construir" Standards Based Linux Instrumentation for Manageability (sblim) bibliotecas anteriores a 1-13a.el4_6.1 en Red Hat Enterprise Linux (RHEL) 4 y anteriores a 1-31.el5_2.1 en RHEL 5. Permite a usuarios locales elevar sus privilegios a través de una biblioteca maliciosa en cierto directorio de var/tmp, relacionado con una incorrecta configuración RPATH, como se muestra en una librería maliciosa libc.so para tog-pegasus. • http://secunia.com/advisories/30803 http://www.securityfocus.com/bid/29913 http://www.securitytracker.com/id?1020354 https://bugzilla.redhat.com/show_bug.cgi?id=447705 https://exchange.xforce.ibmcloud.com/vulnerabilities/43315 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9635 https://rhn.redhat.com/errata/RHSA-2008-0497.html https://access.redhat.com/security/cve/CVE-2008-1951 • CWE-264: Permissions, Privileges, and Access Controls CWE-426: Untrusted Search Path •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

Untrusted search path vulnerability in a certain Red Hat build script for OpenOffice.org (OOo) 1.1.x on Red Hat Enterprise Linux (RHEL) 3 and 4 allows local users to gain privileges via a malicious library in the current working directory, related to incorrect quoting of the ORIGIN symbol for use in the RPATH library path. Vulnerabilidad de búsqueda de ruta no confiable en ciertas secuencias de comandos web usadas para "construir" OpenOffice.org (OOo) 1.1.x sobre Red Hat Enterprise Linux (RHEL) 3 y 4, permite a usuarios locales elevar sus privilegios a través de una biblioteca maliciosa en el directorio actual de trabajo en relación a un entrecomillado incorrecto del símbolo ORIGIN para su uso en la ruta de la biblioteca RPATH. • http://secunia.com/advisories/30633 http://securitytracker.com/id?1020278 http://www.redhat.com/support/errata/RHSA-2008-0538.html http://www.securityfocus.com/bid/29695 https://bugzilla.redhat.com/show_bug.cgi?id=450532 https://exchange.xforce.ibmcloud.com/vulnerabilities/43322 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11361 https://access.redhat.com/security/cve/CVE-2008-2366 • CWE-16: Configuration •

CVSS: 6.4EPSS: 0%CPEs: 66EXPL: 0

Unspecified vulnerability in the Interstage Management Console, as used in Fujitsu Interstage Application Server 6.0 through 9.0.0A, Apworks Modelers-J 6.0 through 7.0, and Studio 8.0.1 and 9.0.0, allows remote attackers to read or delete arbitrary files via unspecified vectors. Vulnerabilidad no especificada en la Interstage Management Console, tal como se utiliza en Fujitsu Interstage Application Server 6.0 a 9.0.0A, Apworks Modelers-J 6.0 a 7.0, y Studio 8.0.1 y 9.0.0, permite a atacantes remotos leer o borrar archivos de su elección a través de vectores no especificados. • http://secunia.com/advisories/30589 http://www.fujitsu.com/global/support/software/security/products-f/interstage-200805e.html http://www.securityfocus.com/bid/29624 http://www.securitytracker.com/id?1020235 http://www.vupen.com/english/advisories/2008/1771/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42949 •

CVSS: 7.5EPSS: 1%CPEs: 15EXPL: 3

Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps. Vulnerabilidad de desbordamiento de búfer en pattern.c en libxslt anteriores a 1.1.24, permiten a atacantes, dependiendo del contexto, provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un fichero de hoja de estilo XSL con una condición "transformation match" XSLT larga que dispara un número grande de pasos. • https://www.exploit-db.com/exploits/31815 http://bugzilla.gnome.org/show_bug.cgi?id=527297 http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://secunia.com/advisories/30315 http://secunia.com/advisories/30323 http://secunia.com/advisories/30393 http://secunia.com/advisories/30521 http://secunia.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •