5 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

File descriptor leak in cronie 1.4.8, when running in certain environments, might allow local users to read restricted files, as demonstrated by reading /etc/crontab. Un agujero en el descriptor de fichero de cronie v1.4.8, cuando funcionan en ciertos entornos, podría permitir a usuarios locales leer archivos restringidos, como se demostró con la lectura de /etc/crontab. • http://www.mandriva.com/security/advisories?name=MDVSA-2013:033 https://bugs.mageia.org/show_bug.cgi?id=8652 https://bugzilla.novell.com/show_bug.cgi?id=786096 https://bugzilla.redhat.com/show_bug.cgi?id=893661 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet. La función pam_parse_in_data_v2 en src/responder/pam/pamsrv_cmd.c en el PAM responder en SSSD v.1.5.0, v.1.4.x, y v.1.3 permite a usuarios locales provocar una denegación de servicio (bucle infinito, caída, y prevención de login) a través de paquetes manipulados. • http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053319.html http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053337.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html http://secunia.com/advisories/43053 http://secunia.com/advisories/43055 http://secunia.com/advisories/43068 http://www.redhat.com/support/errata/RHSA-2011-0560.html http://www.redhat.com/support/errata/RHSA-2011-0975.html http://www.securityfocus.com/bid&#x • CWE-399: Resource Management Errors •

CVSS: 3.6EPSS: 0%CPEs: 2EXPL: 0

The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory. La funcion edit_cmd en crontab.c en (1) cronie anteriores a v1.4.4 y (2) Vixie cron (vixie-cron) permite a usuarios locales cambiar las horas de modificación de ficheros de forma arbitraria, y consecuentemente producir una denegación de servicio, a través de un ataque de enlace simbólico en un fichero temporal en el directorio /tmp. • http://git.fedorahosted.org/git/cronie.git?p=cronie.git%3Ba=commit%3Bh=9e4a8fa5f9171fb724981f53879c9b20264aeb61 http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035762.html http://secunia.com/advisories/38700 http://secunia.com/advisories/38741 http://secunia.com/advisories/48104 http://www.securityfocus.com/bid/38391 https://bugzilla.redhat.com/show_bug.cgi?id=565809 https://access.redhat.com/security/cve/CVE-2010-0424 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box. Desbordamiento de búfer basado en memoria dinámica en textbox.c en newt v0.51.5, v0.51.6, y v0.52.2 permite a usuarios locales provocar una denegación de servicio (caída de aplicación) o posiblemente ejecutar código de su elección a través de una petición que muestre un cuadro de diálogo de texto manipulado. • http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://lists.vmware.com/pipermail/security-announce/2010/000082.html http://secunia.com/advisories/37922 http://secunia.com/advisories/38794 http://secunia.com/advisories/38833 http://security.debian.org/pool/updates/main/n/newt/newt_0.52.2-10+etch1.diff.gz http://support.avaya.com/css/P8/documents/100067251 http://www.debian.org/security/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The local_handler_callback function in server/responder/pam/pam_LOCAL_domain.c in sssd 0.4.1 does not properly handle blank-password accounts in the SSSD BE database, which allows context-dependent attackers to obtain access by sending the account's username, in conjunction with an arbitrary password, over an ssh connection. La función local_handler_callback en server/responder/pam/pam_LOCAL_domain.c en sssd v0.4.1 no maneja apropiadamente contraseña en blanco en la base de datos SSSD BE, lo que permite a los atacantes dependientes de contexto, obtener acceso, enviando el nombre de usuario, junto con una contraseña arbitraria, sobre una conexión ssh. • http://secunia.com/advisories/36018 http://www.securityfocus.com/bid/35868 https://bugzilla.redhat.com/attachment.cgi?id=355424 https://bugzilla.redhat.com/show_bug.cgi?id=514057 https://exchange.xforce.ibmcloud.com/vulnerabilities/52210 https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01236.html • CWE-287: Improper Authentication •