2 results (0.003 seconds)

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes. Rule Set Based Access Control (RSBAC) anterior a 1.3.5 no utiliza de forma adecuada el API Crypto Linux Kernel del Linux kernel 2.6.x, el permite a atacantes dependientes del contexto evitar controles de autenticación a través de vectores no especificados, posiblemente afectando al hashing de la contraseña User Management y los códigos de retorno de la función unchecked. • http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt http://secunia.com/advisories/26147 http://securityreason.com/securityalert/2911 http://www.securityfocus.com/archive/1/474161/100/0/threaded http://www.securityfocus.com/bid/25001 http://www.vupen.com/english/advisories/2007/2610 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Rule Set Based Access Control (RSBAC) 1.2.2 through 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges. • http://marc.info/?l=bugtraq&m=108861182906067&w=2 http://marc.info/?l=bugtraq&m=108879977120430&w=2 http://www.rsbac.org/download/bugfixes http://www.securityfocus.com/bid/10640 https://exchange.xforce.ibmcloud.com/vulnerabilities/16552 •