2 results (0.006 seconds)

CVSS: 7.5EPSS: 3%CPEs: 7EXPL: 0

The TCP reassembly functionality in libnids before 1.18 allows remote attackers to cause "memory corruption" and possibly execute arbitrary code via "overlarge TCP packets." La funcionalidad de re-emsamblado TCp en libnids anteriores a 1.18 permite a atacantes remotos causar una "corrupción de memoria" y posiblemente ejecutar código arbitrario mediante "paquetes TCP grandísimos" • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000773 http://marc.info/?l=bugtraq&m=106728224210446&w=2 http://secunia.com/advisories/10543 http://sourceforge.net/project/shownotes.php?release_id=191323 http://www.debian.org/security/2004/dsa-410 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

configure for Dsniff 2.3, fragroute 1.2, and fragrouter 1.6, when downloaded from monkey.org on May 17, 2002, has been modified to contain a backdoor, which allows remote attackers to access the system. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0281.html http://www.freebsd.org/cgi/query-pr.cgi?pr=38716 http://www.iss.net/security_center/static/9272.php http://www.securityfocus.com/bid/4898 •