F5

Traffix Signaling Delivery Controller

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.76%
  • Veröffentlicht 03.10.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 03:49:08

The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().

  • EPSS 0.62%
  • Veröffentlicht 03.10.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 03:49:07

The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.

  • EPSS 2.28%
  • Veröffentlicht 03.10.2019 16:15:11
  • Zuletzt bearbeitet 03.12.2025 21:15:49

The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().

  • EPSS 1.12%
  • Veröffentlicht 23.09.2019 12:15:10
  • Zuletzt bearbeitet 21.11.2024 04:31:02

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

  • EPSS 3.13%
  • Veröffentlicht 26.07.2019 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:11

An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simpl...

Exploit
  • EPSS 0.74%
  • Veröffentlicht 29.06.2019 17:15:08
  • Zuletzt bearbeitet 21.11.2024 04:24:06

Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this n...

  • EPSS 13.58%
  • Veröffentlicht 19.06.2019 00:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:09

Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial ...

  • EPSS 30.13%
  • Veröffentlicht 19.06.2019 00:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:09

Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denia...

  • EPSS 74.55%
  • Veröffentlicht 19.06.2019 00:15:12
  • Zuletzt bearbeitet 21.11.2024 04:21:09

Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This ha...

Exploit
  • EPSS 15.73%
  • Veröffentlicht 28.05.2019 19:29:06
  • Zuletzt bearbeitet 21.11.2024 04:44:55

A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.