Описание
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-0043
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24347
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0007.html
- http://secunia.com/advisories/18614
- http://secunia.com/advisories/18638
- http://secunia.com/advisories/18889
- http://www.debian.org/security/2006/dsa-975
- http://www.securityfocus.com/bid/16388
- http://www.vupen.com/english/advisories/2006/0348
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks.
Buffer overflow in the realpath function in nfs-server rpc.mountd, as ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS