4 results (0.014 seconds)

CVSS: 3.3EPSS: 1%CPEs: 9EXPL: 2

The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message. La función ndisc_router_discovery en net/ipv6/ndisc.c en la implementación de protocolo Neighbor Discovery (ND) en la pila IPv6 en el kernel de Linux anterior a 3.19.6 permite a atacantes remotos reconfigurar una configuración 'hop-limit' a través de un valor hop_limit pequeño en un mensaje Router Advertisement (RA). It was found that the Linux kernel's TCP/IP protocol suite implementation for IPv6 allowed the Hop Limit value to be set to a smaller value than the default one. An attacker on a local network could use this flaw to prevent systems on that network from sending or receiving network packets. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fd99094de2b83d1d4c8457f2c83483b2828e75a http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155804.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155854.html http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155908.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http:&# • CWE-17: DEPRECATED: Code CWE-454: External Initialization of Trusted Variables or Data Stores •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, allows attackers with certain database privileges to cause a denial of service (inaccessible page) via a non-ASCII character in the name of a link. Cumin (también conocido como MRG Management Console), utilizado en Red Hat Enterprise MRG 2.5, permite a atacantes con ciertos privilegios en la base de datos causar una denegación de servicio (página inaccesible) a través de un caracter no ASCII en el nombre de un enlace. It was found that if Cumin were asked to display a link name containing non-ASCII characters, the request would terminate with an error. If data containing non-ASCII characters were added to the database (such as via Cumin or Wallaby), requests to load said data would terminate and the requested page would not be displayed until an administrator cleans the database. • http://rhn.redhat.com/errata/RHSA-2014-0858.html http://rhn.redhat.com/errata/RHSA-2014-0859.html https://bugzilla.redhat.com/show_bug.cgi?id=830254 https://access.redhat.com/security/cve/CVE-2012-2682 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. Cumin (también conocido como MRG Management Console), utilizado en Red Hat Enterprise MRG 2.5, no incluye el indicador HTTPOnly en una cabecera Set-Cookie para la cookie de la sesión, lo que facilita a atacantes remotos obtener información potencialmente sensible a través del acceso de secuencias de comandos a esta cookie. It was found that Cumin did not set the HttpOnly flag on session cookies. This could allow a malicious script to access the session cookie. • http://rhn.redhat.com/errata/RHSA-2014-0858.html http://rhn.redhat.com/errata/RHSA-2014-0859.html https://access.redhat.com/security/cve/CVE-2014-0174 https://bugzilla.redhat.com/show_bug.cgi?id=1086000 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, uses the DES-based crypt function to hash passwords, which makes it easier for attackers to obtain sensitive information via a brute-force attack. Cumin (también conocido como MRG Management Console), utilizado en Red Hat Enterprise MRG 2.5, utiliza la función crypt basada en DES para crear hashes de contraseñas, lo que facilita a atacantes obtener información sensible a través de un ataque de fuerza bruta. • http://rhn.redhat.com/errata/RHSA-2014-0440.html http://rhn.redhat.com/errata/RHSA-2014-0441.html http://www.securitytracker.com/id/1030158 https://access.redhat.com/security/cve/CVE-2013-6445 https://bugzilla.redhat.com/show_bug.cgi?id=1044315 • CWE-310: Cryptographic Issues •