Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0590

Опубликовано: 04 мар. 2013
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2013-0590: nss-pam-ldapd security update (IMPORTANT)

[0.7.5-18.1]

  • Apply upstream r1926 to resolve FD_SET array index error
  • Resolves: rhbz#915361

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

nss-pam-ldapd

0.7.5-18.1.el6_4

Oracle Linux i686

nss-pam-ldapd

0.7.5-18.1.el6_4

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

redhat
больше 12 лет назад

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

nvd
больше 12 лет назад

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.

debian
больше 12 лет назад

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dep ...

github
больше 3 лет назад

nss-pam-ldapd before 0.7.18 and 0.8.x before 0.8.11 allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code by performing a name lookup on an application with a large number of open file descriptors, which triggers a stack-based buffer overflow related to incorrect use of the FD_SET macro.