6 results (0.010 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The (1) cfmailfilter and (2) cfcron.in files for cfengine 1.6.5 allow local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CVE-2005-2960. • http://bugs.gentoo.org/show_bug.cgi?id=107871 http://groups.google.com/group/gnu.cfengine.help/browse_thread/thread/fc25e7d98f8ba401/38151ed821803be0#38151ed821803be0 http://secunia.com/advisories/17037 http://secunia.com/advisories/17038 http://secunia.com/advisories/17040 http://secunia.com/advisories/17142 http://secunia.com/advisories/17182 http://www.debian.org/security/2005/dsa-835 http://www.debian.org/security/2005/dsa-836 http://www.mandriva.com/security/advisories?name=MDKSA&# •

CVSS: 2.1EPSS: 0%CPEs: 41EXPL: 0

cfengine 1.6.5 and 2.1.16 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by vicf.in, a different vulnerability than CVE-2005-3137. • http://bugs.gentoo.org/show_bug.cgi?id=107871 http://groups.google.com/group/gnu.cfengine.help/browse_thread/thread/fc25e7d98f8ba401/38151ed821803be0#38151ed821803be0 http://secunia.com/advisories/17037 http://secunia.com/advisories/17038 http://secunia.com/advisories/17040 http://secunia.com/advisories/17142 http://secunia.com/advisories/17182 http://secunia.com/advisories/17215 http://www.debian.org/security/2005/dsa-835 http://www.debian.org/security/2005/dsa-836 http://www. •

CVSS: 5.0EPSS: 1%CPEs: 20EXPL: 2

The AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 does not properly check the return value of the ReceiveTransaction function, which leads to a failed malloc call and triggers to a null dereference, which allows remote attackers to cause a denial of service (crash). • http://marc.info/?l=bugtraq&m=109208394910086&w=2 http://secunia.com/advisories/12251 http://security.gentoo.org/glsa/glsa-200408-08.xml http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://www.securityfocus.com/bid/10900 https://exchange.xforce.ibmcloud.com/vulnerabilities/16937 •

CVSS: 10.0EPSS: 13%CPEs: 20EXPL: 5

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication. • https://www.exploit-db.com/exploits/24360 https://www.exploit-db.com/exploits/24361 http://marc.info/?l=bugtraq&m=109208394910086&w=2 http://marc.info/?l=bugtraq&m=110886670528775&w=2 http://secunia.com/advisories/12251 http://security.gentoo.org/glsa/glsa-200408-08.xml http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 http://www.securityfocus.com/bid/10899 https://exchange.xforce.ibmcloud.com/vulnerabilities/16935 •

CVSS: 7.5EPSS: 9%CPEs: 17EXPL: 3

Buffer overflow in net.c for cfengine 2.x before 2.0.8 allows remote attackers to execute arbitrary code via certain packets with modified length values, which is trusted by the ReceiveTransaction function when using a buffer provided by the BusyWithConnection function. Desbordamiento de búfer en net.c de cfengine 2.x a 2.0.8 permite a atacantes remotos ejecutar código arbitrario mediante ciertos paquetes con valores de longitud modificados, del cual se fia la función ReceiveTransaction cuando usa un bufer provisto por la función BusyWithConnection. • https://www.exploit-db.com/exploits/105 https://www.exploit-db.com/exploits/23183 https://www.exploit-db.com/exploits/23182 http://marc.info/?l=bugtraq&m=106451047819552&w=2 http://marc.info/?l=bugtraq&m=106485375218280&w=2 http://marc.info/?l=bugtraq&m=106546086216984&w=2 •