2 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in srsexec in Sun Remote Services (SRS) Net Connect 3.2.3 and 3.2.4, as distributed in the SRS Proxy Core (SUNWsrspx) package, allows local users to gain privileges via format string specifiers in unspecified input that is logged through syslog. Vulnerabilidad de formato de cadena en Sun Remote Services (SRS) Net Connect 3.2.3 y 3.2.4, como distribución en el paquete SRS Proxy Core (SUNWsrspx),permite a usuarios locales ganar privilegios a través de especificaciones de formato de cadena en entradas no especificadas que se validan a través del syslog. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=610 http://osvdb.org/40836 http://secunia.com/advisories/27512 http://sunsolve.sun.com/search/document.do?assetkey=1-26-103119-1 http://sunsolve.sun.com/search/document.do?assetkey=1-66-200581-1 http://www.securityfocus.com/bid/26313 http://www.securitytracker.com/id?1018893 http://www.vupen.com/english/advisories/2007/3711 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 1

srsexec in Sun Remote Services (SRS) Net Connect Software Proxy Core package in Sun Solaris 10 does not enforce file permissions when opening files, which allows local users to read the first line of arbitrary files via the -d and -v options. srsexec en el paquete Sun Remote Services (SRS) Net Connect Software Proxy Core en Sun Solaris 10 no hace cumplir los permisos de ficheros al abrirlos, lo cual permite a usuarios locales leer la primera línea de ficheros de su elección mediante las opciones -d y -v. • https://www.exploit-db.com/exploits/30021 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=531 http://osvdb.org/35940 http://secunia.com/advisories/25194 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102891-1 http://www.securityfocus.com/bid/23915 http://www.securitytracker.com/id?1018046 http://www.vupen.com/english/advisories/2007/1769 https://exchange.xforce.ibmcloud.com/vulnerabilities/34223 https://oval.cisecurity.org/repository/search/definition/ov •