Novell SUSE Linux Enterprise Server 11 Service Pack 1

CPE Details

Novell SUSE Linux Enterprise Server 11 Service Pack 1
11
2010-10-13
14h39 +00:00
2010-10-13
16h51 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:novell:suse_linux:11:sp1:server:*:*:*:*:*

Informations

Vendor

novell

Product

suse_linux

Version

11

Update

sp1

edition

server

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2013-4854 2013-07-26 21h00 +00:00 The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
7.8
CVE-2010-3110 2010-10-12 19h00 +00:00 Multiple buffer overflows in the Novell Client novfs module for the Linux kernel in SUSE Linux Enterprise 11 SP1 and openSUSE 11.3 allow local users to gain privileges via unspecified vectors.
7.2
CVE-2006-5229 2006-10-10 21h00 +00:00 OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
2.6