Name : Debian Security Advisory DSA 317-1 (cupsys) Name : Debian Security Advisory DSA 936-1 (libextractor) Name : FreeBSD Ports: gaim, ja-gaim, ko-gaim, ru-gaim Name : FreeBSD Ports: gaim, ja-gaim, ru-gaim Name : Gentoo Security Advisory GLSA 200601-17 (xpdf poppler gpdf libextractor pdfto. Name : Gentoo Security Advisory GLSA 200601-02 (kdegraphics, kpdf, koffice, kword) Name : Gentoo Security Advisory GLSA 200411-03 (apache) Name : Gentoo Security Advisory GLSA 200410-23 (gaim) Name : Gentoo Security Advisory GLSA 200405-21 (MC) Name : Gentoo Security Advisory GLSA 200312-03 (rsync) Name : Gentoo Security Advisory GLSA 200312-04 (CVS) If you want to see a complete summary for this CPE, please contact us. Rc.M in Slackware 9.0 calls quotacheck with the -M option, which causes the filesystem to be remounted and possibly reset security-relevant mount flags such as nosuid, nodev, and noexec.įailure to Constrain Operations within the Bounds of a Memory BufferĬAPEC : Common Attack Pattern Enumeration & Classification id Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.ĬUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out. Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.ĬVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests. ![]() ![]() Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." Multiple format string vulnerabilities in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code. The CCITTFaxStream::CCITTFaxStream function in for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.īuffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.īuffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer. ![]() ![]() Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins." Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |