libpam-smb contains a buffer overflow that can be used to execute arbitrary commands with root privilege.
Comment
libpam-smb contains a buffer overflow that can be used to execute arbitrary commands with root privilege.
Recently two problems have been found in the glibc suite, which could beused to trick setuid applications to run arbitrary code.
A format string bug was recently discovered in screen which can be used to gain elevated privilages if screen is setuid.
Multiple security problems and a gpmctl vulnerability exists.
A number of possible buffer overruns were found in libraries includedin the affected packages. A denial-of-service vulnerability was also foundin the ksu program.
58 queries. 8.25 mb Memory usage. 0.715 seconds.