- EPSS 0.45%
- Veröffentlicht 13.01.2007 02:28:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
slocate 3.1 does not properly manage database entries that specify names of files in protected directories, which allows local users to obtain the names of private files. NOTE: another researcher reports that the issue is not present in slocate 2.7.
CVE-2005-2499
- EPSS 0.06%
- Veröffentlicht 23.08.2005 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
slocate before 2.7 does not properly process very long paths, which allows local users to cause a denial of service (updatedb exit and incomplete slocate database) via a certain crafted directory structure.
CVE-2003-0848
- EPSS 0.37%
- Veröffentlicht 17.11.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
CVE-2003-0326
- EPSS 0.1%
- Veröffentlicht 09.06.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Integer overflow in parse_decode_path() of slocate may allow attackers to execute arbitrary code via a LOCATE_PATH with a large number of ":" (colon) characters, whose count is used in a call to malloc.
CVE-2003-0056
- EPSS 0.21%
- Veröffentlicht 19.02.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.