Gentoo Essential and Critical Security Patch Updates - Page 185
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
The vulnerabilities in LCDproc allow an attacker to remotely execute arbitrary code or cause the LCDproc server to crash.
A buffer overflow exist in the messaging framework which would allow a remote user to execute commands as the user running the game server.
limbcrypt versions prior to 2.5.5 contain a number of buffer overflow vulnerabilities that stem from imporper or lacking input validation.
A lack of input validation on an external script may make it possible for commands injected by a malicious DHCP server to be executed through the use of shell metacharacters such as ';' and '|'. These commands may run with root privileges.
This vulnerability can make leafnode's nntpd server, named leafnode, go into an unterminated loop when a particular article is requested.
The pdftops filter in the Xpdf and CUPS packages contains an integer overflow that can be exploited to gain the privileges of the target user or in some cases the increased privileges of the 'lp' user if installed setuid.
Exploitation of multiple CUPS vulnerabilities allow local and remote attackers in the worst of the scenarios to gain root privileges.
The SuSE Security Team reviewed critical parts of that package and found several buffer overflows and other bugs remote attackers could exploit to gain access on systems running vulnerable LDAP servers.
Multiple buffer overflow vulnerabilities have been discovered in cyrus-imapd.
Insufficient buffer length checking in user name canonicalization may allow attacker to execute arbitrary code on servers using Cyrus SASL library.
In some instances KDE fails to properly quote parameters of instructions passed to a command shell for execution.
A malicious server could potentially overwrite key files to cause a denial of service or, in some cases, gain privileges by modifying executable files.
A heap overflow vulnerability was discovered in the irw_through function in canna server version 3.6 and earlier.
A security hole has been discovered in Safe.pm. When a Safe compartment has already been used, there's no guarantee that it's safe any longer, because there's a way for code executed within the Safe compartment to alter its operation mask.
read_body.php didn't filter out user input for 'filter_dir' and 'mailbox', making a xss attack possible.
This heap overflow can be used by remote attackers to crash it or to execute arbitrary code with the privileges of the user running fetchmail. Depending on the configuration this allows a remote root compromise.