Page 8 of 48 results (0.011 seconds)

CVSS: 4.9EPSS: 0%CPEs: 210EXPL: 0

Race condition in the pseudo-terminal (aka pty) driver module in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows local users to cause a denial of service (panic) via unspecified vectors related to lack of "properly sequenced code" in ptc and ptsl. Una condición de carrera en el pseudo-terminal (alias PTY) en el módulo controlador de Sun Solaris 8 a 10, y OpenSolaris en versiones anteriores a la snv_103, permite a usuarios locales provocar una denegación de servicio (con un panic del kernel) a través de vectores no especificados relacionados con la falta de "código correctamente secuenciado" en PTC y PTSL. • http://secunia.com/advisories/33708 http://sunsolve.sun.com/search/document.do?assetkey=1-21-113685-07-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-249586-1 http://support.avaya.com/elmodocs2/security/ASA-2009-034.htm http://www.securityfocus.com/bid/33406 http://www.securitytracker.com/id?1021640 https://exchange.xforce.ibmcloud.com/vulnerabilities/48179 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6061 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.0EPSS: 2%CPEs: 192EXPL: 0

libike in Sun Solaris 9 and 10, and OpenSolaris before snv_100, does not properly check packets, which allows remote attackers to cause a denial of service (in.iked daemon crash) via an unspecified IKE packet, a different vulnerability than CVE-2007-2989. libike en Sun Solaris v9 y v10, y OpenSolaris anteriores a snv_100, no chequean los paquetes de forma apropiada, lo que permite a atacantes remotos provocar una denegación de servicio (caída del demonio in.iked) a través de paquetes IKE no especificados, es una vulnerabilidad distinta a CVE-2007-2989 • http://secunia.com/advisories/33702 http://sunsolve.sun.com/search/document.do?assetkey=1-21-113451-15-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-247406-1 http://support.avaya.com/elmodocs2/security/ASA-2009-032.htm http://www.securityfocus.com/bid/33407 https://exchange.xforce.ibmcloud.com/vulnerabilities/48178 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6116 • CWE-20: Improper Input Validation •

CVSS: 4.9EPSS: 0%CPEs: 205EXPL: 0

Unspecified vulnerability in the nfs4rename_persistent_fh function in the NFS 4 (aka NFSv4) client in the kernel in Sun Solaris 10 and OpenSolaris before snv_102 allows local users to cause a denial of service (recursive mutex_enter and panic) via unspecified vectors. Vulnerabilidad no especificada en la función nfs4rename_persistent_fh en el cliente NFS 4 (también conocido como NFSv4) en el kernel en Sun Solaris 10 y OpenSolaris antes de snv_102 permite a usuarios locales provocar una denegación de servicio (mutex_enter recursivo y panic) mediante vectores no especificados. • http://mail.opensolaris.org/pipermail/onnv-notify/2008-October/015342.html http://secunia.com/advisories/33361 http://sunsolve.sun.com/search/document.do?assetkey=1-21-139466-02-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-248566-1 http://www.securityfocus.com/bid/33128 http://www.securitytracker.com/id?1021519 http://www.vupen.com/english/advisories/2009/0030 https://exchange.xforce.ibmcloud.com/vulnerabilities/47750 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 91EXPL: 0

Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session). Una vulnerabilidad sin especificar en el X Inter Client Exchange library (tambien llamado libICE) en Sun Solaris 8 a 10 y en versiones de OpenSolaris anteriores a la snv_85, permite atacantes dependientes de contexto causar una denegación de servicio (mediante un fallo de aplicación), como lo demuestra un escaneo de puertos que desencadena una violación de segmento en el Gnome Session Manager(alias gnome-session). • http://secunia.com/advisories/33157 http://secunia.com/advisories/33325 http://securitytracker.com/id?1021391 http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1 http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm http://www.securityfocus.com/bid/32807 http://www.vupen.com/english/advisories/2008/3431 https://exchange.xforce.ibmcloud.com/vulnerabilities/47311 https://oval.cisecurity.org&#x • CWE-399: Resource Management Errors •

CVSS: 5.8EPSS: 0%CPEs: 182EXPL: 0

ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS server with Network Address Translation (NAT) configured, improperly changes the source port of a packet when the destination port is the DNS port, which allows remote attackers to bypass an intended CVE-2008-1447 protection mechanism and spoof the responses to DNS queries sent by named. ipnat en IP Filter de Sun Solaris v10 y OpenSolaris anteriores a snv_96, cuando se ejecutan en servidor DNS con traducción de direcciones de red (NAT) configurado cambia el puerto origen de forma incorrecta cuando el puerto destino es el puerto DNS, lo que permite a atacantes remotos evitar e intentar el mecanismo de protección CVE-2008-1447 y espíar las respuestas a solicitudes DNS enviadas por nombre. • http://secunia.com/advisories/32625 http://sunsolve.sun.com/search/document.do?assetkey=1-26-245206-1 http://www.vupen.com/english/advisories/2008/3129 https://exchange.xforce.ibmcloud.com/vulnerabilities/46721 • CWE-264: Permissions, Privileges, and Access Controls •