Vulnerabilities > Mandrakesoft

DATE CVE VULNERABILITY TITLE RISK
2008-02-29 CVE-2008-0595 Permissions, Privileges, and Access Controls vulnerability in multiple products
dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in the security policy only for fully qualified method calls, which allows local users to bypass intended access restrictions via a method call with a NULL interface.
local
low complexity
d-bus mandrakesoft red-hat redhat CWE-264
4.6
2008-02-28 CVE-2008-0411 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ghostscript 0/8.0.1/8.15
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
6.8
2008-02-04 CVE-2008-0386 Improper Input Validation vulnerability in Gentoo Xdg-Utils 1.0.2
Xdg-utils 1.0.2 and earlier allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a URL argument to (1) xdg-open or (2) xdg-email.
6.8
2008-01-29 CVE-2008-0008 Improper Input Validation vulnerability in Pulseaudio 0.9.6/0.9.8
The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.
local
low complexity
mandrakesoft redhat pulseaudio CWE-20
7.2
2008-01-12 CVE-2007-6284 Resource Management Errors vulnerability in multiple products
The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
network
low complexity
debian mandrakesoft redhat CWE-399
5.0
2007-11-07 CVE-2007-5116 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
7.5
2007-09-18 CVE-2007-4938 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value.
7.6
2007-09-18 CVE-2007-4137 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trolltech QT
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.
7.5
2007-06-21 CVE-2007-2833 Remote Denial of Service vulnerability in GNU Emacs Image Processing
Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
network
low complexity
debian mandrakesoft gnu
7.8
2007-04-06 CVE-2007-1352 Local Integer Overflow vulnerability in X.Org LibXFont
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
3.8