Show filters
1,191 Total Results
Displaying 521-530 of 1,191
Sort by:
Attacker Value
Unknown
CVE-2018-6951
Disclosure Date: February 13, 2018 (last updated November 26, 2024)
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
0
Attacker Value
Unknown
CVE-2018-6872
Disclosure Date: February 09, 2018 (last updated November 08, 2023)
The elf_parse_notes function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (out-of-bounds read and segmentation violation) via a note with a large alignment.
0
Attacker Value
Unknown
CVE-2018-6829
Disclosure Date: February 07, 2018 (last updated November 26, 2024)
cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
0
Attacker Value
Unknown
CVE-2018-6759
Disclosure Date: February 06, 2018 (last updated November 26, 2024)
The bfd_get_debug_link_info_1 function in opncls.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, has an unchecked strnlen operation. Remote attackers could leverage this vulnerability to cause a denial of service (segmentation fault) via a crafted ELF file.
0
Attacker Value
Unknown
CVE-2009-5144
Disclosure Date: February 03, 2018 (last updated November 26, 2024)
mod-gnutls does not validate client certificates when "GnuTLSClientVerify require" is set in a directory context, which allows remote attackers to spoof clients via a crafted certificate.
0
Attacker Value
Unknown
CVE-2018-6551
Disclosure Date: February 02, 2018 (last updated November 08, 2023)
The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
0
Attacker Value
Unknown
CVE-2018-6543
Disclosure Date: February 02, 2018 (last updated November 26, 2024)
In GNU Binutils 2.30, there's an integer overflow in the function load_specific_debug_section() in objdump.c, which results in `malloc()` with 0 size. A crafted ELF file allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
0
Attacker Value
Unknown
CVE-2018-6485
Disclosure Date: February 01, 2018 (last updated November 26, 2024)
An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
0
Attacker Value
Unknown
CVE-2017-1000409
Disclosure Date: February 01, 2018 (last updated November 26, 2024)
A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
0
Attacker Value
Unknown
CVE-2017-1000408
Disclosure Date: February 01, 2018 (last updated November 26, 2024)
A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
0