Page 8 of 49 results (0.014 seconds)

CVSS: 5.0EPSS: 1%CPEs: 91EXPL: 0

Unspecified vulnerability in the X Inter Client Exchange library (aka libICE) in Sun Solaris 8 through 10 and OpenSolaris before snv_85 allows context-dependent attackers to cause a denial of service (application crash), as demonstrated by a port scan that triggers a segmentation violation in the Gnome session manager (aka gnome-session). Una vulnerabilidad sin especificar en el X Inter Client Exchange library (tambien llamado libICE) en Sun Solaris 8 a 10 y en versiones de OpenSolaris anteriores a la snv_85, permite atacantes dependientes de contexto causar una denegación de servicio (mediante un fallo de aplicación), como lo demuestra un escaneo de puertos que desencadena una violación de segmento en el Gnome Session Manager(alias gnome-session). • http://secunia.com/advisories/33157 http://secunia.com/advisories/33325 http://securitytracker.com/id?1021391 http://sunsolve.sun.com/search/document.do?assetkey=1-21-119067-11-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243566-1 http://support.avaya.com/elmodocs2/security/ASA-2008-513.htm http://www.securityfocus.com/bid/32807 http://www.vupen.com/english/advisories/2008/3431 https://exchange.xforce.ibmcloud.com/vulnerabilities/47311 https://oval.cisecurity.org&#x • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 160EXPL: 2

tun in IP Tunnel in Solaris 10 and OpenSolaris snv_01 through snv_76 allows local users to cause a denial of service (panic) and possibly execute arbitrary code via a crafted SIOCGTUNPARAM IOCTL request, which triggers a NULL pointer dereference. Tun en IP Tunnel en Solaris 10 y OpenSolaris snv_01 a snv_76 permite a usuarios locales causar una denegación de servicio (causando un panic del sistema) y, posiblemente, ejecutar código arbitrario a través de una solicitud SIOCGTUNPARAM IOCTL modificada, que ocasiona una desreferencia a un puntero NULL. • https://www.exploit-db.com/exploits/15962 http://secunia.com/advisories/33160 http://securityreason.com/securityalert/4801 http://sunsolve.sun.com/search/document.do?assetkey=1-26-242266-1 http://www.exploit-db.com/exploits/15962 http://www.securityfocus.com/archive/1/499352/100/0/threaded http://www.securityfocus.com/bid/32904 http://www.securitytracker.com/id?1021464 http://www.trapkit.de/advisories/TKADV2008-015.txt http://www.vupen.com/english/advisories/2008/3454 https& • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 0%CPEs: 210EXPL: 0

The Kerberos credential renewal feature in Sun Solaris 8, 9, and 10, and OpenSolaris build snv_01 through snv_104, allows local users to cause a denial of service (authentication failure) via unspecified vectors related to incorrect cache file permissions, and lack of credential storage by the store_cred function in pam_krb5. La funcionalidad de renovación de credenciales de Kerberos en Sun Solaris versiones 8, 9 y 10, y OpenSolaris build snv_01 hasta snv_104, permite a usuarios locales causar una denegación de servicio (fallo de autenticación) por medio de vectores no especificados relacionados con permisos incorrectos de archivos de caché y falta de almacenamiento de credenciales por parte de la función store_cred en pam_krb5. • http://secunia.com/advisories/33042 http://secunia.com/advisories/33313 http://sunsolve.sun.com/search/document.do?assetkey=1-21-112908-33-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-244866-1 http://support.avaya.com/elmodocs2/security/ASA-2008-515.htm http://www.securityfocus.com/bid/32793 http://www.securitytracker.com/id?1021390 http://www.vupen.com/english/advisories/2008/3428 https://exchange.xforce.ibmcloud.com/vulnerabilities/47291 https://oval.cisecurity • CWE-255: Credentials Management Errors •

CVSS: 5.8EPSS: 0%CPEs: 182EXPL: 0

ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS server with Network Address Translation (NAT) configured, improperly changes the source port of a packet when the destination port is the DNS port, which allows remote attackers to bypass an intended CVE-2008-1447 protection mechanism and spoof the responses to DNS queries sent by named. ipnat en IP Filter de Sun Solaris v10 y OpenSolaris anteriores a snv_96, cuando se ejecutan en servidor DNS con traducción de direcciones de red (NAT) configurado cambia el puerto origen de forma incorrecta cuando el puerto destino es el puerto DNS, lo que permite a atacantes remotos evitar e intentar el mecanismo de protección CVE-2008-1447 y espíar las respuestas a solicitudes DNS enviadas por nombre. • http://secunia.com/advisories/32625 http://sunsolve.sun.com/search/document.do?assetkey=1-26-245206-1 http://www.vupen.com/english/advisories/2008/3129 https://exchange.xforce.ibmcloud.com/vulnerabilities/46721 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 4%CPEs: 210EXPL: 1

in.dhcpd in the DHCP implementation in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unknown DHCP requests related to the "number of offers," aka Bug ID 6713805. in.dhcpd para la implementación DHCP de Sun Solaris v8 hasta v10 y OpenSolaris anterior a snv_103; permite a atacantes remotos provocar una denegación de servicio (fallo de aserción y salida del demonio) a través de solicitudes DHCP desconocidas relacionadas con el "número de ofertas" (number of offers). También se conoce como Fallo ID 6713805. • https://www.exploit-db.com/exploits/4601 http://secunia.com/advisories/32668 http://securitytracker.com/id?1021157 http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1 http://www.securityfocus.com/bid/32213 http://www.vupen.com/english/advisories/2008/3088 https://exchange.xforce.ibmcloud.com/vulnerabilities/46480 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5668 •