2 results (0.008 seconds)

CVSS: 4.9EPSS: 0%CPEs: 26EXPL: 2

Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise. Desbordamiento de entero en la función fts_build en fts.c de libc sobre (1) OpenBSD v4.4 y anteriores y (2) Microsoft Interix v6.0 build 10.0.6030.0, permiten a atacantes, dependiendo del contexto, provocar una denegación de servicio (caída de la aplicación) a través de un arbol de directorio profundo, relativo al miembro de la estructura fts_level, como se ha demostrado por (a) du, (b) rm, (c) chmod, y (d) chgrp en OpenBSD; y (e)SearchIndexer.exe en Vista Enterprise. • https://www.exploit-db.com/exploits/8163 http://securityreason.com/achievement_securityalert/60 http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h http://www.securityfocus.com/archive/1/501505/100/0/threaded http://www.securityfocus.com/bid/34008 http://www.securitytracker.com/id?1021818 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

Buffer overflow in telnet server in Windows 2000 and Interix 2.2 allows remote attackers to execute arbitrary code via malformed protocol options. Desbordamiento de buffer en el servicio de telnet en Windows 2000 y Interix 2.2 permite a atacantes remotos ejecutar código arbitrario mediante opciones de protocolo malformadas. • http://www.iss.net/security_center/static/8094.php http://www.securityfocus.com/bid/4061 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-004 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A424 •