Vulnerabilities > Fedoraproject

DATE CVE VULNERABILITY TITLE RISK
2011-02-23 CVE-2011-1067 Improper Input Validation vulnerability in Fedoraproject 389 Directory Server
slapd (aka ns-slapd) in 389 Directory Server before 1.2.8.a2 does not properly manage the c_timelimit field of the connection table element, which allows remote attackers to cause a denial of service (daemon outage) via Simple Paged Results connections, as demonstrated by using multiple processes to replay TCP sessions, a different vulnerability than CVE-2011-0019.
network
low complexity
fedoraproject CWE-20
5.0
2011-02-23 CVE-2011-0532 Permissions, Privileges, and Access Controls vulnerability in multiple products
The (1) backup and restore scripts, (2) main initialization script, and (3) ldap-agent script in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x) place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
local
high complexity
fedoraproject redhat CWE-264
6.2
2011-02-23 CVE-2011-0022 Resource Management Errors vulnerability in multiple products
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.
4.7
2011-02-23 CVE-2011-0019 Improper Input Validation vulnerability in multiple products
slapd (aka ns-slapd) in 389 Directory Server 1.2.7.5 (aka Red Hat Directory Server 8.2.x or dirsrv) does not properly handle simple paged result searches, which allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via multiple search requests.
network
low complexity
fedoraproject redhat CWE-20
7.5
2011-02-23 CVE-2010-4746 Resource Management Errors vulnerability in Fedoraproject 389 Directory Server
Multiple memory leaks in the normalization functionality in 389 Directory Server before 1.2.7.5 allow remote attackers to cause a denial of service (memory consumption) via "badly behaved applications," related to (1) Slapi_Attr mishandling in the DN normalization code and (2) pointer mishandling in the syntax normalization code, a different issue than CVE-2011-0019.
network
low complexity
fedoraproject CWE-399
5.0
2011-02-18 CVE-2010-4744 Multiple unspecified vulnerabilities in abcm2ps before 5.9.13 have unknown impact and attack vectors, a different issue than CVE-2010-3441.
network
low complexity
moinejf fedoraproject
critical
10.0
2011-02-18 CVE-2010-4743 Out-Of-Bounds Write vulnerability in multiple products
Heap-based buffer overflow in the getarena function in abc2ps.c in abcm2ps before 5.9.13 might allow remote attackers to execute arbitrary code via a crafted ABC file, a different vulnerability than CVE-2010-3441.
6.8
2011-02-18 CVE-2010-3441 Classic Buffer Overflow vulnerability in multiple products
Multiple buffer overflows in abcm2ps before 5.9.12 might allow remote attackers to execute arbitrary code via (1) a crafted input file, related to the PUT0 and PUT1 output macros; (2) a crafted input file, related to the trim_title function; and possibly (3) a long -O option on a command line.
network
low complexity
moinejf fedoraproject CWE-120
7.5
2011-01-25 CVE-2010-4341 Resource Management Errors vulnerability in multiple products
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
local
low complexity
fedorahosted fedoraproject CWE-399
2.1
2011-01-20 CVE-2011-0495 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Digium Asterisk
Stack-based buffer overflow in the ast_uri_encode function in main/utils.c in Asterisk Open Source before 1.4.38.1, 1.4.39.1, 1.6.1.21, 1.6.2.15.1, 1.6.2.16.1, 1.8.1.2, 1.8.2.; and Business Edition before C.3.6.2; when running in pedantic mode allows remote authenticated users to execute arbitrary code via crafted caller ID data in vectors involving the (1) SIP channel driver, (2) URIENCODE dialplan function, or (3) AGI dialplan function.
6.0