5 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user. SCO UnixWare 7.1.1, 7.1.3, y Open UNIX 8.0.0 permite que usuarios locales se salten protecciones para un PID de proceso obteniendo un descriptor de fichero procfs para el fichero y llamando a execve() en un programa con bits setuid o setgid, lo que deja al descriptor abierto al usuario. • ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.32/CSSA-2003-SCO.32.txt http://marc.info/?l=bugtraq&m=106865297403687&w=2 http://www.texonet.com/advisories/TEXONET-20031024.txt •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via (1) a modified DTHELPUSERSEARCHPATH environment variable and the Help feature, (2) DTSEARCHPATH, or (3) LOGNAME. Desbordamiento de búfer en la librería libDtHelp de CDE permite a usuarios locales ejecutar código arbitrario mediante una variable de entorno DTHELPUSSEARCHPATH modificada en la característica "Help". • https://www.exploit-db.com/exploits/713 https://www.exploit-db.com/exploits/714 ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P http://archives.neohapsis.com/archives/hp/2003-q4/0047.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57414 http://www.idefense.com/application/poi/display?id=134&type=vulnerabilities&flashstatus=false http://www.kb.cert.org/vuls/id/575804 http://www.securityfocus.com/bid/8973 https://oval.cisecurity.org/reposito •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 2

Buffer overflow in rpc.cmsd in SCO UnixWare 7.1.1 and Open UNIX 8.0.0 allows remote attackers to execute arbitrary commands via a long parameter to rtable_create (procedure 21). • ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.12/CSSA-2002-SCO.12.txt http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0127.html http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0129.html http://www.iss.net/security_center/static/8597.php •

CVSS: 4.6EPSS: 0%CPEs: 48EXPL: 0

Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls. Safe.pm 2.0.7 y anteriores, si se usan con Perl 5.8.0 y anteriores, pueden permitir a atacantes escapar de compartimientos seguros en Safe::reval o Safe::rdo usando una variable @_ redefinida, que no es reestablecida entre llamadas sucesivas. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744 http://marc.info/?l=bugtraq&m=104005919814869&w=2 http://marc.info/?l=bugtraq&m=104033126305252&w=2 http://marc.info/?l=bugtraq&m=10404 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The timed program (in.timed) in UnixWare 7 and OpenUnix 8.0.0 does not properly terminate certain strings with a null, which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0020.html •