6 results (0.012 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

paxtest handles temporary files insecurely paxtest, maneja archivos temporales de manera no segura. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598413 https://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-3373.html https://security-tracker.debian.org/tracker/CVE-2010-3373 • CWE-20: Improper Input Validation •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 0

The RBAC functionality in grsecurity before 2.1.11-2.6.24.5 and 2.1.11-2.4.36.2 does not enforce user_transition_deny and user_transition_allow rules for the (1) sys_setfsuid and (2) sys_setfsgid calls, which allows local users to bypass restrictions for those calls. la funcionalidad RBAC en grsecurity anterior a 2.1.11-2.6.24.5 y 2.1.11-2.4.36.2, no refuerza adecuadamente las reglas de user_transition_deny y user_transition_allow para las llamadas a (1) sys_setfsuid y (2) sys_setfsgid, lo que permite a usuarios locales evitar ciertas restricciones para esas llamadas. • http://secunia.com/advisories/29899 http://www.grsecurity.org/news.php#grsec21113 http://www.securityfocus.com/bid/28889 http://www.securitytracker.com/id?1019919 http://www.vupen.com/english/advisories/2008/1323/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41952 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in the grsecurity patch has unspecified impact and remote attack vectors, a different vulnerability than the expand_stack vulnerability from the Digital Armaments 20070110 pre-advisory. NOTE: the grsecurity developer has disputed this issue, stating that "the function they claim the vulnerability to be in is a trivial function, which can, and has been, easily checked for any supposed vulnerabilities." The developer also cites a past disclosure that was not proven ** EN DISPUTA ** La vulnerabilidad no especificada en el parche grsecurity tiene un impacto no especificado y vectores de ataque remoto, una vulnerabilidad diferente a la vulnerabilidad expand_stack del pre-asesor Digital Armaments 20070110. NOTA: el desarrollador de grsecurity ha impugnado este problema, afirmando que "la función en la que afirman que está la vulnerabilidad es una función trivial, que puede, y ha sido, fácilmente comprobada por cualquier supuesta vulnerabilidad". El desarrollador también cita una divulgación anterior que no fue probada. • http://forums.grsecurity.net/viewtopic.php?t=1646 http://grsecurity.net/news.php#digitalfud http://www.digitalarmaments.com/news_news.shtml •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 1

Unspecified vulnerability in the expand_stack function in grsecurity PaX allows local users to gain privileges via unspecified vectors. NOTE: the grsecurity developer has disputed this issue, stating that "the function they claim the vulnerability to be in is a trivial function, which can, and has been, easily checked for any supposed vulnerabilities." The developer also cites a past disclosure that was not proven. As of 20070120, the original researcher has released demonstration code ** DISPUTADA ** Vulnerabilidad no especificada en la función expand_stack en grsecurity PaX permite a usuarios locales obtener privilegios a través de vectores no especificados. NOTA: el desarrollador grsecurity ha disputado este problema, diciendo que 'la función donde dicen que está la vulnerabilidad es una función insignificante, que puede ser, y ha sido, fácilmente comprobada por cualquier supuesta vulnerabilidad.' • https://www.exploit-db.com/exploits/29446 http://forums.grsecurity.net/viewtopic.php?t=1646 http://grsecurity.net/news.php#digitalfud http://osvdb.org/32727 http://secunia.com/advisories/23713 http://securitytracker.com/id?1017509 http://www.digitalarmaments.com/news_news.shtml http://www.digitalarmaments.com/pre2007-00018659.html http://www.securityfocus.com/archive/1/456626/100/0/threaded http://www.securityfocus.com/archive/1/456722/100/0/threaded http://www.securityfocus. •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

The RBAC functionality in grsecurity before 2.1.8 does not properly handle when the admin role creates a service and then exits the shell without unauthenticating, which causes the service to be restarted with the admin role still active. • http://secunia.com/advisories/18458 http://www.grsecurity.org/news.php#grsec218 http://www.securityfocus.com/bid/16261 http://www.vupen.com/english/advisories/2006/0199 https://exchange.xforce.ibmcloud.com/vulnerabilities/24156 •