Debian

Debian Linux

9213 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 26.12.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:34

GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archive...

Exploit
  • EPSS 1.19%
  • Veröffentlicht 26.12.2018 04:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:34

XRef::getEntry in XRef.cc in Poppler 0.72.0 mishandles unallocated XRef entries, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted PDF document, when XRefEntry::setFlag in XRef.h is called from Parser...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 26.12.2018 03:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:32

In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.

  • EPSS 2.5%
  • Veröffentlicht 24.12.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:28

c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.

Exploit
  • EPSS 0.59%
  • Veröffentlicht 24.12.2018 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:01:27

GNU Libextractor through 1.8 has an out-of-bounds read vulnerability in the function history_extract() in plugins/ole2_extractor.c, related to EXTRACTOR_common_convert_to_utf8 in common/convert.c.

Exploit
  • EPSS 0.6%
  • Veröffentlicht 24.12.2018 05:29:01
  • Zuletzt bearbeitet 21.11.2024 04:01:28

GNU Libextractor through 1.8 has a NULL Pointer Dereference vulnerability in the function process_metadata() in plugins/ole2_extractor.c.

Exploit
  • EPSS 1.27%
  • Veröffentlicht 23.12.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:25

Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used...

Exploit
  • EPSS 0.5%
  • Veröffentlicht 22.12.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:19

An invalid memory address dereference was discovered in the sbr_process_channel function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to deni...

Exploit
  • EPSS 17.56%
  • Veröffentlicht 21.12.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:01:17

SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by l...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 20.12.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:23

In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscri...