4 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 56EXPL: 0

Certain Fedora build scripts for nfs-utils before 1.1.2-9.fc9 on Fedora 9, and before 1.1.4-6.fc10 on Fedora 10, omit TCP Wrapper support, which might allow remote attackers to bypass intended access restrictions, possibly a related issue to CVE-2008-1376. Algunos Fedora crean secuencias de comando para nfs-utils anteriores a v1.1.2-9.fc9 en Fedora 9, y anteriores a v1.1.4-6.fc10 en Fedora 10, no da soporte a TCP Wrapper, lo que podría permitir a atacantes remotos evitar las restricciones de acceso previstas, posiblemente esté relacionado con el caso CVE-2008-1376. • http://secunia.com/advisories/33545 http://www.securityfocus.com/bid/33294 https://bugzilla.redhat.com/show_bug.cgi?id=477864 https://exchange.xforce.ibmcloud.com/vulnerabilities/48058 https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00376.html https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00526.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrappers support, which might allow remote attackers to bypass intended access restrictions. Ciertas secuencias de comandos web usadas para "construir" nfs-utils anterior a 1.0.9-35z.el5_2 sobre Red Hat Enterprise Linux (RHEL) 5 omite soporte de paquetes TCP, los cuales permiten a atacantes remotos saltarse las restricciones de acceso previstas. • http://secunia.com/advisories/31322 http://secunia.com/advisories/35162 http://www.redhat.com/support/errata/RHSA-2008-0486.html http://www.redhat.com/support/errata/RHSA-2009-0955.html http://www.securityfocus.com/bid/30466 http://www.securitytracker.com/id?1020589 https://exchange.xforce.ibmcloud.com/vulnerabilities/44256 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10638 https://access.redhat.com/security/cve/CVE-2008-1376 https://bugzilla&# • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 24%CPEs: 10EXPL: 0

rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conversion, which leads to a stack-based buffer overflow and allows remote attackers to execute arbitrary code via a crafted NFS request. rquotad en nfs-utils (rquota_server.c) anteriores a 1.0.6-r6 en arquitecturas de 64 bits no realiza una conversión de enteros adecuadamente, lo que conduce a un desbordamiento de búfer basado en la pila y permite a atacantes remotos ejecutar código arbitrario mediante una petición NFS artesanal. • http://bugs.gentoo.org/show_bug.cgi?id=72113 http://secunia.com/advisories/13440 http://www.gentoo.org/security/en/glsa/glsa-200412-08.xml http://www.kb.cert.org/vuls/id/698302 http://www.mandriva.com/security/advisories?name=MDKSA-2005:005 http://www.redhat.com/support/errata/RHSA-2004-583.html http://www.redhat.com/support/errata/RHSA-2005-014.html http://www.securityfocus.com/archive/1/426072/30/6740/threaded http://www.securityfocus.com/bid/11911 https:&#x •

CVSS: 5.0EPSS: 11%CPEs: 25EXPL: 0

statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated. statd en nfs-utils 1.257 y anteriores hace caso a la señal SIGPIPE, lo que permite a atacanes remotos causar una denegación de servicio (caída de proceso de servidor) mediante una conexión TCP que es terminada prematuramente. • http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup http://www.debian.org/security/2004/dsa-606 http://www.redhat.com/support/errata/RHSA-2004-583.html http://www.redhat.com/support/errata/RHSA-2005-014.html http://www.securityfocus.com/archive/1/426072/30/6740/threaded http://www.securityfocus.com/bid/11785 http://www.trustix.org/errata/2004/0065 https://exchange.xforce.ibmcloud.com/vulnerabilities/18332 https://oval.cisecurity.org/reposi •