Vulnerabilities of Novell openSUSENovell openSUSE vulnerability: use after free via NetLogon
An unauthenticated attacker can force the usage of a freed memory area in NetLogon of Samba, in order to trigger a denial of service, and possibly to execute code with root privileges.Novell openSUSE vulnerability: denial of service via ActivationFailure
A local attacker can send ActivationFailure messages to D-Bus, in order to trigger a denial of service.Novell openSUSE vulnerability: buffer overflow of swscanf
An attacker can generate a buffer overflow in swscanf() of the glibc, in order to trigger a denial of service, and possibly to execute code.Novell openSUSE vulnerability: code execution
An attacker can invite the victim to display a malicious Adobe Flash Player animation, in order to execute code.Novell openSUSE vulnerability: buffer overflow of gethostbyname, GHOST
An attacker can for example send an email using a long IPv4 address, to force the messaging server to resolve this address, and to generate a buffer overflow in gethostbyname() of the glibc, in order to trigger a denial of service, and possibly to execute code. Several programs using the gethostbyname() function are vulnerable with a similar attack vector.Display other vulnerabilities of Novell openSUSE described by Vigil@nce...
Display information about Novell openSUSE: