6.8
CVE-2013-0288
- EPSS 2.9%
- Veröffentlicht 05.03.2013 21:38:55
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Arthurdejong ≫ Nss-pam-ldapd Version0.8.0
Arthurdejong ≫ Nss-pam-ldapd Version0.8.1
Arthurdejong ≫ Nss-pam-ldapd Version0.8.2
Arthurdejong ≫ Nss-pam-ldapd Version0.8.3
Arthurdejong ≫ Nss-pam-ldapd Version0.8.4
Arthurdejong ≫ Nss-pam-ldapd Version0.8.5
Arthurdejong ≫ Nss-pam-ldapd Version0.8.6
Arthurdejong ≫ Nss-pam-ldapd Version0.8.7
Arthurdejong ≫ Nss-pam-ldapd Version0.8.8
Arthurdejong ≫ Nss-pam-ldapd Version0.8.9
Arthurdejong ≫ Nss-pam-ldapd Version0.8.10
Arthurdejong ≫ Nss-pam-ldapd Version <= 0.7.17
Arthurdejong ≫ Nss-pam-ldapd Version0.1
Arthurdejong ≫ Nss-pam-ldapd Version0.2
Arthurdejong ≫ Nss-pam-ldapd Version0.2.1
Arthurdejong ≫ Nss-pam-ldapd Version0.3
Arthurdejong ≫ Nss-pam-ldapd Version0.4
Arthurdejong ≫ Nss-pam-ldapd Version0.4.1
Arthurdejong ≫ Nss-pam-ldapd Version0.5
Arthurdejong ≫ Nss-pam-ldapd Version0.6
Arthurdejong ≫ Nss-pam-ldapd Version0.6.0
Arthurdejong ≫ Nss-pam-ldapd Version0.6.1
Arthurdejong ≫ Nss-pam-ldapd Version0.6.2
Arthurdejong ≫ Nss-pam-ldapd Version0.6.3
Arthurdejong ≫ Nss-pam-ldapd Version0.6.4
Arthurdejong ≫ Nss-pam-ldapd Version0.6.5
Arthurdejong ≫ Nss-pam-ldapd Version0.6.6
Arthurdejong ≫ Nss-pam-ldapd Version0.6.7
Arthurdejong ≫ Nss-pam-ldapd Version0.6.7.1
Arthurdejong ≫ Nss-pam-ldapd Version0.6.7.2
Arthurdejong ≫ Nss-pam-ldapd Version0.6.8
Arthurdejong ≫ Nss-pam-ldapd Version0.6.9
Arthurdejong ≫ Nss-pam-ldapd Version0.6.10
Arthurdejong ≫ Nss-pam-ldapd Version0.6.11
Arthurdejong ≫ Nss-pam-ldapd Version0.6.12
Arthurdejong ≫ Nss-pam-ldapd Version0.7.0
Arthurdejong ≫ Nss-pam-ldapd Version0.7.1
Arthurdejong ≫ Nss-pam-ldapd Version0.7.2
Arthurdejong ≫ Nss-pam-ldapd Version0.7.3
Arthurdejong ≫ Nss-pam-ldapd Version0.7.4
Arthurdejong ≫ Nss-pam-ldapd Version0.7.5
Arthurdejong ≫ Nss-pam-ldapd Version0.7.6
Arthurdejong ≫ Nss-pam-ldapd Version0.7.7
Arthurdejong ≫ Nss-pam-ldapd Version0.7.8
Arthurdejong ≫ Nss-pam-ldapd Version0.7.9
Arthurdejong ≫ Nss-pam-ldapd Version0.7.10
Arthurdejong ≫ Nss-pam-ldapd Version0.7.11
Arthurdejong ≫ Nss-pam-ldapd Version0.7.12
Arthurdejong ≫ Nss-pam-ldapd Version0.7.13
Arthurdejong ≫ Nss-pam-ldapd Version0.7.14
Arthurdejong ≫ Nss-pam-ldapd Version0.7.15
Arthurdejong ≫ Nss-pam-ldapd Version0.7.16
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.9% | 0.858 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.