Canonical » Ubuntu Linux » 12.04 esm : Security Vulnerabilities
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
Net-SNMP through 5.7.3 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
Max Base Score | 7.8 |
Published | 2020-08-20 |
Updated | 2020-09-04 |
EPSS | 0.05% |
An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.
Max Base Score | 5.5 |
Published | 2020-09-16 |
Updated | 2021-10-19 |
EPSS | 0.04% |
In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
Max Base Score | 7.5 |
Published | 2020-04-28 |
Updated | 2022-04-29 |
EPSS | 8.43% |
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
Max Base Score | 5.5 |
Published | 2020-06-08 |
Updated | 2023-06-12 |
EPSS | 0.04% |
Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
Max Base Score | 7.1 |
Published | 2020-01-30 |
Updated | 2023-05-24 |
EPSS | 0.27% |
In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.
Max Base Score | 8.8 |
Published | 2020-04-01 |
Updated | 2021-12-02 |
EPSS | 0.50% |
In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.
Max Base Score | 6.5 |
Published | 2020-04-01 |
Updated | 2022-08-29 |
EPSS | 0.25% |
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Max Base Score | 5.5 |
Published | 2020-06-15 |
Updated | 2022-04-28 |
EPSS | 0.05% |
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
Max Base Score | 7.5 |
Published | 2020-06-11 |
Updated | 2022-10-14 |
EPSS | 1.56% |
In exif_data_save_data_entry of exif-data.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-148705132
Max Base Score | 5.0 |
Published | 2020-05-14 |
Updated | 2022-10-14 |
EPSS | 0.04% |
libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.
Max Base Score | 5.5 |
Published | 2019-07-15 |
Updated | 2021-11-30 |
EPSS | 0.13% |
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
Max Base Score | 7.5 |
Published | 2020-07-13 |
Updated | 2023-05-24 |
EPSS | 0.59% |
The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
Max Base Score | 7.8 |
Published | 2019-12-30 |
Updated | 2020-10-20 |
EPSS | 0.08% |
SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
Max Base Score | 5.9 |
Published | 2019-11-27 |
Updated | 2022-04-19 |
EPSS | 0.13% |
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
Max Base Score | 7.5 |
Published | 2019-10-18 |
Updated | 2020-08-24 |
EPSS | 0.80% |
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
Max Base Score | 6.5 |
Published | 2019-09-12 |
Updated | 2020-08-24 |
EPSS | 0.26% |
In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
Max Base Score | 6.5 |
Published | 2019-09-09 |
Updated | 2023-03-23 |
EPSS | 0.54% |
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
Max Base Score | 4.4 |
Published | 2019-09-13 |
Updated | 2021-07-21 |
EPSS | 0.04% |
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
Max Base Score | 9.0 |
Published | 2019-10-17 |
Updated | 2022-04-18 |
EPSS | 1.87% |
It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
Max Base Score | 6.3 |
Published | 2019-09-25 |
Updated | 2021-07-21 |
EPSS | 0.21% |
An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
Max Base Score | 7.5 |
Published | 2019-07-26 |
Updated | 2022-06-13 |
EPSS | 0.16% |
BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
Max Base Score | 9.8 |
Published | 2019-06-19 |
Updated | 2022-06-27 |
EPSS | 1.59% |
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
Max Base Score | 7.5 |
Published | 2019-06-19 |
Updated | 2023-08-16 |
EPSS | 96.72% |
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
Max Base Score | 7.8 |
Published | 2019-06-19 |
Updated | 2023-08-16 |
EPSS | 97.29% |
libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
Max Base Score | 9.8 |
Published | 2019-04-10 |
Updated | 2023-03-24 |
EPSS | 0.20% |