
CVE-2012-3406 – glibc: printf() unbound alloca() usage in case of positional parameters + many format specs
https://notcve.org/view.php?id=CVE-2012-3406
10 Feb 2014 — The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability t... • http://rhn.redhat.com/errata/RHSA-2012-1097.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-4226
https://notcve.org/view.php?id=CVE-2010-4226
06 Feb 2014 — cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive. cpio, tal como se utiliza en build 2007.05.10, 2010.07.28 y probablemente otras versiones, permite a atacantes remotos sobreescribir archivos arbitrarios a través de un symlink dentro de un archivo del paquete RPM. • http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2013-7039 – Gentoo Linux Security Advisory 201402-01
https://notcve.org/view.php?id=CVE-2013-7039
13 Dec 2013 — Stack-based buffer overflow in the MHD_digest_auth_check function in libmicrohttpd before 0.9.32, when MHD_OPTION_CONNECTION_MEMORY_LIMIT is set to a large value, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long URI in an authentication header. Desbordamiento de búfer basado en pila en la función MHD_digest_auth_check en libmicrohttpd anterior a 0.9.32, cuando MHD_OPTION_CONNECTION_MEMORY_LIMIT se establece en un valor grande, lo que permite a atacan... • http://secunia.com/advisories/55903 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-7038 – Gentoo Linux Security Advisory 201402-01
https://notcve.org/view.php?id=CVE-2013-7038
13 Dec 2013 — The MHD_http_unescape function in libmicrohttpd before 0.9.32 might allow remote attackers to obtain sensitive information or cause a denial of service (crash) via unspecified vectors that trigger an out-of-bounds read. La función MHD_http_unescape en libmicrohttpd anterior a 0.9.32 podría permitir a un atacante remoto obtener información sensible o causar una denegación de servicio (caída) a través de vectores no especificados que provoquen lecturas fuera de rango Multiple vulnerabilities have been found i... • http://secunia.com/advisories/55903 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4458 – glibc: Stack (frame) overflow in getaddrinfo() when called with AF_INET6
https://notcve.org/view.php?id=CVE-2013-4458
25 Nov 2013 — Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914. Desbordamiento de búfer basado en pila en la función getaddrinfo en sysdeps/posix/getaddrinfo.c de GNU C Library (también conocido com... • http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-121: Stack-based Buffer Overflow •

CVE-2013-4466
https://notcve.org/view.php?id=CVE-2013-4466
19 Nov 2013 — Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries. Desbordamiento de búfer en la función dane_query_tlsa de la librería DANE (libdane) en GnuTLS 3.1.x anterior a la versión 3.1.15 y 3.2.x anterior a 3.2.5 permite en servidores remotos provocar una denegación de servicio (corrupción de memoria) a través de una r... • http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7049 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4487
https://notcve.org/view.php?id=CVE-2013-4487
19 Nov 2013 — Off-by-one error in the dane_raw_tlsa in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.16 and 3.2.x before 3.2.6 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries. NOTE: this issue is due to an incomplete fix for CVE-2013-4466. Error de superación de límite en dane_raw_tlsa en la librería DANE (libdane) de GnuTLS 3.1.x anterior a la versión 3.1.16 y 3.2.x anterior a 3.2.6 permite en servidores remotos provocar una denegación de ser... • http://lists.opensuse.org/opensuse-updates/2013-11/msg00064.html • CWE-189: Numeric Errors •

CVE-2013-2207 – Mandriva Linux Security Advisory 2013-283
https://notcve.org/view.php?id=CVE-2013-2207
09 Oct 2013 — pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. pt_chown en GNU C Library (también conocida como glibc o libc6) anterior a la versión 2.18 no comprueba adecuadamente los permisos para archivos tty, lo que permite a usuarios locales cambiar el permiso en los archivos y obtener acceso a pseudo-terminals ar... • http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-4237 – glibc: Buffer overwrite when using readdir_r on file systems returning file names longer than NAME_MAX characters
https://notcve.org/view.php?id=CVE-2013-4237
09 Oct 2013 — sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image. sysdeps/posix/readdir_r.c en GNU C Library (también conocido como glibc o libc6) 2.18 y anteriores permite a atacantes dependientes del contexto provocar una denegación de servicio (escritura fuera de límites y cuelgue) o posiblemente ejecutar código arb... • http://secunia.com/advisories/55113 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVE-2012-4412 – GNU glibc - 'strcoll()' Routine Integer Overflow
https://notcve.org/view.php?id=CVE-2012-4412
09 Oct 2013 — Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow. Desbordamiento de enteros en string/strcoll_l.c en GNU C Library (también conocida como glibc o libc6) 2.17 y anteriores versiones permite a atacantes dependientes del contexto provocar una denegación del servicio (cuelgue) o posiblemente ejec... • https://packetstorm.news/files/id/153278 • CWE-189: Numeric Errors •