4 results (0.003 seconds)

CVSS: 5.3EPSS: 1%CPEs: 7EXPL: 0

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. cifs-utils versiones hasta 6.14, con registro detallado, puede causar un filtrado de información cuando un archivo contiene caracteres = (signo de igualdad) pero no es un archivo de credenciales válido • https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379 https://github.com/piastry/cifs-utils/pull/7 https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXKZLJYJJEC3TIBFLXUORRMZUKG5W676 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.8EPSS: 0%CPEs: 60EXPL: 0

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. En cifs-utils versiones hasta 6.14, un desbordamiento del búfer en la región stack de la memoria cuando es analizado el argumento de línea de comandos mount.cifs ip= podría conllevar a que atacantes locales obtuvieran privilegios de root • http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba https://bugzilla.samba.org/show_bug.cgi?id=15025 https://bugzilla.suse.com/show_bug.cgi?id=1197216 https://github.com/piastry/cifs-utils/pull/7 https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765 https://lists.debian.org/debian-lts-announce/2022/05/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WBOLMANBYJILXQKRRK7OCR774PXJAYY https://lists& • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 0

Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors. Desbordamiento de buffer basado en pila en cifskey.c o cifscreds.c en cifs-utils anterior a 6.4, utilizado en pam_cifscreds, permite a atacantes remotos tener un impacto no especificado a través de vectores desconocidos. • http://advisories.mageia.org/MGASA-2014-0242.html http://seclists.org/oss-sec/2014/q2/96 http://www.mandriva.com/security/advisories?name=MDVSA-2015:114 https://bugs.mageia.org/show_bug.cgi?id=13386 https://bugzilla.novell.com/show_bug.cgi?id=870168 https://bugzilla.redhat.com/show_bug.cgi?id=1086224 https://lists.samba.org/archive/samba-technical/2014-July/101132.html https://security.gentoo.org/glsa/201612-08 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message. mount.cifs en cifs-utils v2.6 permite a los usuarios locales determinar la existencia de ficheros o directorios arbitrarios a través de la ruta del archivo en el segundo argumento, que revela la existencia de un mensaje de error. • https://www.exploit-db.com/exploits/18783 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665923 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html http://www.openwall.com/lists/oss-security/2012/03/27/1 http://www.openwall.com/lists/oss-security/2012/03/27/6 https://bugzilla.samba.org/show_bug.cgi?id=8821 https://access.redhat.com/security/cve/CVE-2012-1586 https://bugzilla.redhat.com/show_bug.cgi?id=807252 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •