Debian

Debian Linux

9141 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.8%
  • Published 05.06.2012 22:55:09
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Dropbear SSH Server 0.52 through 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple cra...

  • EPSS 1.29%
  • Published 05.06.2012 22:55:09
  • Last modified 11.04.2025 00:51:21

Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the R...

  • EPSS 0.27%
  • Published 05.06.2012 22:55:09
  • Last modified 11.04.2025 00:51:21

Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image. NOTE: this vulnerability exis...

  • EPSS 0.29%
  • Published 05.06.2012 22:55:07
  • Last modified 11.04.2025 00:51:21

ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.

  • EPSS 1.43%
  • Published 05.06.2012 22:55:07
  • Last modified 11.04.2025 00:51:21

The GetEXIFProperty function in magick/property.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (crash) via a zero value in the component count of an EXIF XResolution tag in a JPEG file, which triggers an out-of-b...

  • EPSS 1.94%
  • Published 05.06.2012 22:55:07
  • Last modified 11.04.2025 00:51:21

The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.

  • EPSS 4.21%
  • Published 05.06.2012 22:55:06
  • Last modified 11.04.2025 00:51:21

ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.

  • EPSS 4.3%
  • Published 02.06.2012 15:55:00
  • Last modified 11.04.2025 00:51:21

chan_iax2.c in the IAX2 channel driver in Certified Asterisk 1.8.11-cert before 1.8.11-cert2 and Asterisk Open Source 1.8.x before 1.8.12.1 and 10.x before 10.4.1, when a certain mohinterpret setting is enabled, allows remote attackers to cause a den...

  • EPSS 0.49%
  • Published 29.05.2012 20:55:08
  • Last modified 11.04.2025 00:51:21

Puppet 2.6.x before 2.6.15 and 2.7.x before 2.7.13, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows remote authenticated users with agent SSL keys and file-creation permissions on the puppet master to execute ar...

  • EPSS 0.08%
  • Published 17.05.2012 11:00:36
  • Last modified 11.04.2025 00:51:21

The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context...