CVE-2007-5197
https://notcve.org/view.php?id=CVE-2007-5197
Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods. El desbordamiento de búfer en la clase Mono.Math.BigInteger en Mono versión 1.2.5.1 y anteriores permite que los atacantes dependiendo del contexto ejecutar código arbitrario por medio de vectores no específicos relacionados a Reduce en métodos Pow basados en Montgomery. • http://bugs.gentoo.org/attachment.cgi?id=134361&action=view http://bugs.gentoo.org/show_bug.cgi?id=197067 http://secunia.com/advisories/27439 http://secunia.com/advisories/27493 http://secunia.com/advisories/27511 http://secunia.com/advisories/27583 http://secunia.com/advisories/27612 http://secunia.com/advisories/27639 http://secunia.com/advisories/27937 http://www.debian.org/security/2007/dsa-1397 http://www.gentoo.org/security/en/glsa/glsa-200711-10.xml http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5471
https://notcve.org/view.php?id=CVE-2007-5471
libgssapi before 0.6-13.7, as used by the ISC BIND named daemon in SUSE Linux Enterprise Server 10 SP 1, terminates upon an initialization error, which allows remote attackers to cause a denial of service (daemon exit) via a GSS-TSIG request. NOTE: this issue probably affects other daemons that attempt to initialize this library within a chroot configuration or other invalid configuration. libgssapi versiones anteriores a 0.6-13.7, tal y como se usa en el demonio ISC BIND en SUSE Linux Enterprise Server 10 SP 1, concluye con un error de inicialización, lo cual permite a atacantes remotos provocar una denegación de servicio (finalización de demonio) mediante una petición GSS-TSIG. NOTA: Este asunto afecta a otros demonios que intentan inicializar esta biblioteca con una configuración chroot u otra configuración inválida. • http://osvdb.org/40935 http://secunia.com/advisories/27189 http://www.securityfocus.com/bid/26076 https://exchange.xforce.ibmcloud.com/vulnerabilities/37233 https://secure-support.novell.com/KanisaPlatform/Publishing/936/3665923_f.SAL_Public.html •
CVE-2007-5195
https://notcve.org/view.php?id=CVE-2007-5195
Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5196. Vulnerabilidad no especificada en la implementación SSL del sistema cliente Groupwise en el paquete novell-groupwise-client de SUSE Linux Enterprise Desktop 10 permite a atacantes remotos obtener credenciales mediante un ataque de hombre-en-medio, una vulnerabilidad diferente de CVE-2007-5196. • http://osvdb.org/45492 http://secunia.com/advisories/27229 http://www.novell.com/linux/security/advisories/2007_20_sr.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-310: Cryptographic Issues •
CVE-2007-5196
https://notcve.org/view.php?id=CVE-2007-5196
Unspecified vulnerability in the SSL implementation in Groupwise client system in the novell-groupwise-client package in SUSE Linux Enterprise Desktop 10 allows remote attackers to obtain credentials via a man-in-the-middle attack, a different vulnerability than CVE-2007-5195. Vulnerabilidad no especificada en la implementación SSL del sistema cliente Groupwise en el paquete novell-groupwise-client de SUSE Linux Enterprise Desktop 10 permite a atacantes remotos obtener credenciales mediante un ataque de hombre en el medio, una vulnerabilidad diferente de CVE-2007-5195. • http://osvdb.org/45491 http://secunia.com/advisories/27229 http://www.novell.com/linux/security/advisories/2007_20_sr.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-310: Cryptographic Issues •
CVE-2007-4432
https://notcve.org/view.php?id=CVE-2007-4432
Untrusted search path vulnerability in the wrapper scripts for the (1) rug, (2) zen-updater, (3) zen-installer, and (4) zen-remover programs on SUSE Linux 10.1 and Enterprise 10 allows local users to gain privileges via modified (a) LD_LIBRARY_PATH and (b) MONO_GAC_PREFIX environment variables. Vulnerabilidad de búsqueda en ruta no confiable en las secuencias de comandos wrapper para los programas (1) rug, (2) zen-updater, (3) zen-installer, y (4) zen-remover sobre SUSE Linux 10.1 y Enterprise 10 permiten a usuarios locales ganar privilegios a través de modificaciones de variables de entorno (a) LD_LIBRARY_PATH y (b) MONO_GAC_PREFIX. • http://osvdb.org/46781 http://osvdb.org/46782 http://osvdb.org/46783 http://osvdb.org/46784 http://secunia.com/advisories/26543 http://www.novell.com/linux/security/advisories/2007_17_sr.html •