Page 88 of 1101 results (0.015 seconds)

CVSS: 7.8EPSS: 0%CPEs: 31EXPL: 0

11 Dec 2009 — The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp. La regla distcheck en dist-check.mk en GNU coreutils desde v5.2.1 hasta v8.1 permite a usuarios locales ganar privilegios a través de un ataque de enlace simbólico en un fichero que este en la carpeta /tmp. It was discovered that the distcheck rule in dist-check.mk in GNU coreutils allows local users to gain privileges via a symlink attac... • http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

01 Dec 2009 — GNU GRand Unified Bootloader (GRUB) 2 1.97 only compares the submitted portion of a password with the actual password, which makes it easier for physically proximate attackers to conduct brute force attacks and bypass authentication by submitting a password whose length is 1. GNU GRand Unified Bootloader (GRUB) 2 v1.97 únicamente compara el fragmento enviado de una contraseña con la contraseña actual, lo que facilita que atacantes próximos realicen ataques de fuerza bruta y eviten la autenticación mediante ... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=555195 • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 0%CPEs: 15EXPL: 0

27 Nov 2009 — ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file. ltdl.c en libltdl en GNU Libtool v1.5.x, y v2.2.6 anterior v2.2.6b, intenta abrir un archivo .la en el directorio de trabajo, lo que permite a usuarios locales obtener privilegios a través de un troyano. This GLSA contains notification of vulne... • ftp://ftp.gnu.org/gnu/libtool/libtool-2.2.6a-2.2.6b.diff.gz •

CVSS: 9.8EPSS: 3%CPEs: 21EXPL: 6

09 Nov 2009 — The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other... • https://www.exploit-db.com/exploits/10071 • CWE-295: Improper Certificate Validation CWE-300: Channel Accessible by Non-Endpoint •

CVSS: 10.0EPSS: 0%CPEs: 16EXPL: 0

30 Sep 2009 — GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. GNU Wget, en versiones anteriores a la 1.12 no maneja adecuadamente un caracter '\0' en un nombre de dominio, en el campo Common Name de una certificado X.509, lo cual permite a atacantes hombre-... • http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 0%CPEs: 121EXPL: 0

12 Aug 2009 — libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. libgnutls en GnuTLS versiones anteriores a v2.8.2 no gestiona adecuadamente un carácter '\0' en el nombre de dominio en los campos de identificación (1) Common Name (C... • http://article.gmane.org/gmane.network.gnutls.general/1733 • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 1%CPEs: 161EXPL: 0

30 Jul 2009 — The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large. La librería Network Security Services (NSS) en versiones anteri... • http://java.sun.com/j2se/1.5.0/ReleaseNotes.html • CWE-310: Cryptographic Issues •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 2

16 Jun 2009 — Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2) GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS certificate in the chain is accepted instead of verifying the entire chain, which allows remote attackers to spoof trusted servers via a man-in-the-middle attack. Mutt v1.5.º9, enlazado contra (1) OpenSSL (mutt_ssl.c) o (2) GnuTLS (mutt_ssl_gnutls.c), permite conexiones cuando se acepta un certificado TLS en la cadena en vez de verificar esta última, lo que permite a atacantes re... • http://dev.mutt.org/hg/mutt/rev/64bf199c8d8a • CWE-287: Improper Authentication •

CVSS: 5.0EPSS: 0%CPEs: 117EXPL: 0

30 Apr 2009 — gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls_x509, as used by (a) Exim, (b) OpenLDAP, and (c) libsoup. gnutls-cli en GnuTLS anteriores a v2.6.6 no verifica la activación y tiempos de caducidad de los certificados X.50... • http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3517 • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 25%CPEs: 1EXPL: 2

30 Apr 2009 — lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free. lib/pk-libgcrypt.c en libgnutls en GnuTLS anterior a v2.6.6 no maneja correctamente las firmas DSA, lo cual permite a atacantes remotos provocar una denegación de servicio (cuelgue de aplic... • https://www.exploit-db.com/exploits/32964 • CWE-824: Access of Uninitialized Pointer •