Orange Applications for Business
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free trial free trial
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerable product
Vulnerabilities of Novell openSUSE

Novell openSUSE vulnerability: use after free via NetLogon
An unauthenticated attacker can force the usage of a freed memory area in NetLogon of Samba, in order to trigger a denial of service, and possibly to execute code with root privileges.

Novell openSUSE vulnerability: denial of service via ActivationFailure
A local attacker can send ActivationFailure messages to D-Bus, in order to trigger a denial of service.

Novell openSUSE vulnerability: buffer overflow of swscanf
An attacker can generate a buffer overflow in swscanf() of the glibc, in order to trigger a denial of service, and possibly to execute code.

Novell openSUSE vulnerability: code execution
An attacker can invite the victim to display a malicious Adobe Flash Player animation, in order to execute code.

Novell openSUSE vulnerability: buffer overflow of gethostbyname, GHOST
An attacker can for example send an email using a long IPv4 address, to force the messaging server to resolve this address, and to generate a buffer overflow in gethostbyname() of the glibc, in order to trigger a denial of service, and possibly to execute code. Several programs using the gethostbyname() function are vulnerable with a similar attack vector.

Display other vulnerabilities of Novell openSUSE described by Vigil@nce...

Display information about Novell openSUSE:



















Copyright 1999-2015 Vigil@nce. Vigil@nce is a service from Orange Applications for Business. Site map. Legal notice. Version française