Orange Business Services
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free access free access
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerable product
Vulnerabilities of SLES

SLES vulnerability: integer overflow of PRI
An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code.

SLES vulnerability: bypassing the certification chain via ASN.1
An attacker can create a malicious X.509 certificate, which is accepted as valid, in order to deceive services using the RSA signature (such as SSL/TLS sessions).

SLES vulnerability: multiple vulnerabilities
An attacker can use several vulnerabilities of D-Bus.

SLES vulnerability: use after free via SPL ArrayIterator
A local attacker can use a freed memory area in SPL ArrayIterator of PHP, in order to trigger a denial of service, and possibly to execute code.

SLES vulnerability: denial of service via iconv and IBM93x
An attacker can provide special IBM933, IBM935, IBM937, IBM939 or IBM1364 data to an application linked to the glibc and using iconv(), in order to trigger a denial of service.

Display other vulnerabilities of SLES described by Vigil@nce...

Display information about SLES:



















Copyright 1999-2014 Vigil@nce. Vigil@nce is a service from Orange Business Services. Site map. Legal notice. Version française