Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerable product
Vulnerabilities of SLES

SLES vulnerability: code execution via Function Variable
An attacker can define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.

SLES vulnerability: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark.

SLES vulnerability: use after free via SPL ArrayIterator
A local attacker can use a freed memory area in SPL ArrayIterator of PHP, in order to trigger a denial of service, and possibly to execute code.

SLES vulnerability: denial of service via iconv and IBM93x
An attacker can provide special IBM933, IBM935, IBM937, IBM939 or IBM1364 data to an application linked to the glibc and using iconv(), in order to trigger a denial of service.

SLES vulnerability: buffer overflow of __gconv_translit_find
An attacker can generate a buffer overflow in the __gconv_translit_find() function of the glibc, in order to trigger a denial of service, and possibly to execute code.

Display other vulnerabilities of SLES described by Vigil@nce...

Display information about SLES:

Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française