Debian

Debian Linux

9950 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.15%
  • Veröffentlicht 21.02.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:32:46

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is ...

  • EPSS 1.15%
  • Veröffentlicht 21.02.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:32:46

The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote at...

  • EPSS 1.52%
  • Veröffentlicht 21.02.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 02:32:46

The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemo...

Exploit
  • EPSS 0.92%
  • Veröffentlicht 19.02.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:53

The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.

  • EPSS 21.31%
  • Veröffentlicht 19.02.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:53

The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafte...

  • EPSS 0.26%
  • Veröffentlicht 19.02.2018 19:29:00
  • Zuletzt bearbeitet 03.12.2025 22:15:49

A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may exp...

  • EPSS 38.43%
  • Veröffentlicht 19.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:31:45

Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.

Exploit
  • EPSS 4.26%
  • Veröffentlicht 19.02.2018 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:49

An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an ...

  • EPSS 9.3%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:41

The Quagga BGP daemon (bgpd) prior to version 1.2.3 does not properly bounds check the data sent with a NOTIFY to a peer, if an attribute length is invalid. Arbitrary data from the bgpd process may be sent over the network to a peer and/or bgpd may c...

  • EPSS 7.03%
  • Veröffentlicht 19.02.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:08:41

The Quagga BGP daemon (bgpd) prior to version 1.2.3 can double-free memory when processing certain forms of UPDATE message, containing cluster-list and/or unknown attributes. A successful attack could cause a denial of service or potentially allow an...