Canonical

Ubuntu Linux

4106 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.33%
  • Veröffentlicht 25.08.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Directory traversal vulnerability in GNU patch versions which support Git-style patching before 2.7.3 allows remote attackers to write to arbitrary files with the permissions of the target user via a .. (dot dot) in a diff file name.

Exploit
  • EPSS 4.28%
  • Veröffentlicht 24.08.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

  • EPSS 1.09%
  • Veröffentlicht 23.08.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In ImageMagick before 6.9.9-0 and 7.x before 7.0.6-1, the ReadOneMNGImage function in coders/png.c has an out-of-bounds read with the MNG CLIP chunk.

  • EPSS 1.33%
  • Veröffentlicht 23.08.2017 06:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.

  • EPSS 0.75%
  • Veröffentlicht 11.08.2017 02:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for t...

  • EPSS 0.56%
  • Veröffentlicht 10.08.2017 22:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked ...

  • EPSS 0.71%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attac...

Exploit
  • EPSS 0.97%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applica...

  • EPSS 0.36%
  • Veröffentlicht 10.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the ...

  • EPSS 1.44%
  • Veröffentlicht 09.08.2017 21:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In /drivers/isdn/i4l/isdn_net.c: A user-controlled buffer is copied into a local buffer of constant size using strcpy without a length check which can cause a buffer overflow. This affects the Linux kernel 4.9-stable tree, 4.12-stable tree, 3.18-stab...