[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:104680
The nss-pam-ldapd daemon, nslcd, uses a directory server to look up name service information on behalf of a lightweight nsswitch module.

oval:org.secpod.oval:def:600971
Garth Mollett discovered that a file descriptor overflow issue in the use of FD_SET in nss-pam-ldapd, which provides NSS and PAM modules for using LDAP as a naming service, can lead to a stack-based buffer overflow. An attacker could, under some circumstances, use this flaw to cause a process that h ...

oval:org.secpod.oval:def:1500035
Updated nss-pam-ldapd packages that fix one security issue are nowavailable for Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as havingimportant security impact. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is availab ...

oval:org.secpod.oval:def:601056
The security update DSA-2628 for nss-pam-ldapd failed to build on kfreebsd-amd64 and kfreebsd-i386.

oval:org.secpod.oval:def:202587
The nss-pam-ldapd packages provide the nss-pam-ldapd daemon , which uses a directory server to lookup name service information on behalf of a lightweight nsswitch module. An array index error, leading to a stack-based buffer overflow flaw, was found in the way nss-pam-ldapd managed open file descrip ...

oval:org.secpod.oval:def:501006
The nss-pam-ldapd packages provide the nss-pam-ldapd daemon , which uses a directory server to lookup name service information on behalf of a lightweight nsswitch module. An array index error, leading to a stack-based buffer overflow flaw, was found in the way nss-pam-ldapd managed open file descrip ...

oval:org.secpod.oval:def:205793
The advisory is missing the security advisory description. For more information please visit the reference link

CWE    1
CWE-119
*CVE
CVE-2013-0288

© SecPod Technologies