redhat/fedora_core: The latest CVE Vulnerabilities and Exploits for Penetration Test
redhat/fedora_core Vulnerability Summary
- Vendor name: redhat
- Product name: fedora_core
- Total vulnerabilities: 83 (as 2023-05-04)
redhat/fedora_core Vulnerability List
CVE-2008-2944: Double free vulnerability in the utrace support in the Linux kernel, probably 2.6.18, in Red Hat…
Published: 2008-06-30T21:41:00 Last Modified: 2022-02-07T19:50:00
Summary
Double free vulnerability in the utrace support in the Linux kernel, probably 2.6.18, in Red Hat Enterprise Linux (RHEL) 5 and Fedora Core 6 (FC6) allows local users to cause a denial of service (oops), as demonstrated by a crash when running the GNU GDB testsuite, a different vulnerability than CVE-2008-2365.
Common Weakness Enumeration (CWE): CWE-415: Double Free
CWE Description: The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2008-2944 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=207002
- https://bugzilla.redhat.com/show_bug.cgi?id=449359
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43556
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6283: Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable…
Published: 2007-12-18T01:46:00 Last Modified: 2022-02-03T17:19:00
Summary
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
Common Weakness Enumeration (CWE): CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CWE Description: Separate mistakes or weaknesses could inadvertently make the sensitive information available to an attacker, such as in a detailed error message that can be read by an unauthorized party
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-6283 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2007-6283
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00587.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00671.html
- http://secunia.com/advisories/28180
- http://www.redhat.com/support/errata/RHSA-2008-0300.html
- http://secunia.com/advisories/30313
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9977
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-6131: buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite arbitrary files via a…
Published: 2007-11-26T22:46:00 Last Modified: 2011-03-08T03:01:00
Summary
buttonpressed.sh in scanbuttond 0.2.3 allows local users to overwrite arbitrary files via a symlink attack on the (1) scan.pnm and (2) scan.jpg temporary files.
Common Weakness Enumeration (CWE): CWE-16: Configuration
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-6131 vulnerability.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=383131
- http://www.securityfocus.com/bid/26617
- http://secunia.com/advisories/27847
- http://securitytracker.com/id?1019007
- http://osvdb.org/42422
- http://www.vupen.com/english/advisories/2007/4024
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-2874: Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora…
Published: 2007-07-27T21:30:00 Last Modified: 2011-03-08T02:55:00
Summary
Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora NetworkManager package before 0.6.5-3.fc7 allows user-assisted remote attackers to execute arbitrary code via malformed frames on a WPA2 network. NOTE: some of these details are obtained from third party information.
Scores
- Impact Score: 4.9
- Exploitability Score: 8.6
- CVSS: 5.8
- CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2007-2874 vulnerability.
References
- http://www.redhat.com/archives/fedora-package-announce/2007-June/msg00032.html
- http://fedoraproject.org/wiki/FSA/F7/FEDORA-2007-0186
- http://osvdb.org/46833
- http://www.vupen.com/english/advisories/2007/2053
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-3103: The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow…
Published: 2007-07-15T22:30:00 Last Modified: 2018-10-16T16:47:00
Summary
The init.d script for the X.Org X11 xfs font server on various Linux distributions might allow local users to change the permissions of arbitrary files via a symlink attack on the /tmp/.font-unix temporary file.
Common Weakness Enumeration (CWE): CWE-59: Improper Link Resolution Before File Access (‘Link Following’)
CWE Description: The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2007-3103 vulnerability.
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=557
- http://bugzilla.redhat.com/242903
- http://www.redhat.com/support/errata/RHSA-2007-0519.html
- http://www.redhat.com/support/errata/RHSA-2007-0520.html
- https://issues.rpath.com/browse/RPL-1485
- http://bugs.gentoo.org/show_bug.cgi?id=185660
- http://www.debian.org/security/2007/dsa-1342
- http://security.gentoo.org/glsa/glsa-200710-11.xml
- http://www.securityfocus.com/bid/24888
- http://www.securitytracker.com/id?1018375
- http://secunia.com/advisories/26081
- http://secunia.com/advisories/26282
- http://secunia.com/advisories/26056
- http://secunia.com/advisories/27240
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00096.html
- http://secunia.com/advisories/35674
- https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00095.html
- http://osvdb.org/40945
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35375
- https://www.exploit-db.com/exploits/5167
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10802
- http://www.securityfocus.com/archive/1/473869/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-2030: lharc.c in lha does not securely create temporary files, which might allow local users to read or…
Published: 2007-04-16T20:19:00 Last Modified: 2017-07-29T01:31:00
Summary
lharc.c in lha does not securely create temporary files, which might allow local users to read or write files by creating a file before LHA is invoked.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2007-2030 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=236585
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:117
- http://www.securityfocus.com/bid/24336
- http://secunia.com/advisories/25519
- http://osvdb.org/37049
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34063
See also: All popular products CVE Vulnerabilities of redhat
CVE-2007-1352: Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows…
Published: 2007-04-06T01:19:00 Last Modified: 2018-10-16T16:38:00
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Scores
- Impact Score: 4.9
- Exploitability Score: 4.4
- CVSS: 3.8
- CVSS Vector: AV:A/AC:M/Au:S/C:N/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: MEDIUM
- Vector: ADJACENT_NETWORK
Currently, there is no code for exploiting the CVE-2007-1352 vulnerability.
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502
- http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html
- http://www.redhat.com/support/errata/RHSA-2007-0126.html
- http://www.ubuntu.com/usn/usn-448-1
- http://www.securityfocus.com/bid/23283
- http://www.securitytracker.com/id?1017857
- http://secunia.com/advisories/24741
- http://secunia.com/advisories/24756
- http://secunia.com/advisories/24770
- http://issues.foresightlinux.org/browse/FL-223
- https://issues.rpath.com/browse/RPL-1213
- http://rhn.redhat.com/errata/RHSA-2007-0125.html
- http://www.redhat.com/support/errata/RHSA-2007-0132.html
- http://secunia.com/advisories/24745
- http://secunia.com/advisories/24758
- http://secunia.com/advisories/24765
- http://secunia.com/advisories/24771
- http://secunia.com/advisories/24772
- http://secunia.com/advisories/24791
- http://www.novell.com/linux/security/advisories/2007_27_x.html
- http://secunia.com/advisories/25004
- http://www.openbsd.org/errata39.html#021_xorg
- http://www.openbsd.org/errata40.html#011_xorg
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1
- http://www.securityfocus.com/bid/23300
- http://secunia.com/advisories/25006
- http://security.gentoo.org/glsa/glsa-200705-10.xml
- http://secunia.com/advisories/25195
- http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm
- http://secunia.com/advisories/25216
- http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
- http://www.debian.org/security/2007/dsa-1294
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:079
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:080
- http://secunia.com/advisories/25305
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://secunia.com/advisories/33937
- http://support.apple.com/kb/HT3438
- http://www.vupen.com/english/advisories/2007/1548
- http://www.vupen.com/english/advisories/2007/1217
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33419
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523
- http://www.securityfocus.com/archive/1/464816/100/0/threaded
- http://www.securityfocus.com/archive/1/464686/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-6235: A “stack overwrite” vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0…
Published: 2006-12-07T11:28:00 Last Modified: 2018-10-17T21:47:00
Summary
A “stack overwrite” vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-6235 vulnerability.
References
- http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
- http://www.redhat.com/support/errata/RHSA-2006-0754.html
- http://www.securityfocus.com/bid/21462
- http://secunia.com/advisories/23245
- http://www.ubuntu.com/usn/usn-393-1
- http://secunia.com/advisories/23250
- http://secunia.com/advisories/23255
- http://secunia.com/advisories/23269
- https://issues.rpath.com/browse/RPL-835
- http://www.debian.org/security/2006/dsa-1231
- http://security.gentoo.org/glsa/glsa-200612-03.xml
- http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
- http://www.trustix.org/errata/2006/0070
- http://www.ubuntu.com/usn/usn-393-2
- http://securitytracker.com/id?1017349
- http://secunia.com/advisories/23259
- http://secunia.com/advisories/23299
- http://secunia.com/advisories/23303
- http://secunia.com/advisories/23329
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
- http://www.novell.com/linux/security/advisories/2006_28_sr.html
- http://secunia.com/advisories/23290
- http://secunia.com/advisories/23335
- http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
- http://www.kb.cert.org/vuls/id/427009
- http://secunia.com/advisories/23284
- ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
- http://secunia.com/advisories/23513
- http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm
- http://secunia.com/advisories/24047
- http://www.vupen.com/english/advisories/2006/4881
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
- http://www.securityfocus.com/archive/1/453723/100/0/threaded
- http://www.securityfocus.com/archive/1/453664/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-5701: Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5…
Published: 2006-11-03T23:07:00 Last Modified: 2017-07-20T01:33:00
Summary
Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.9
- CVSS: 4.9
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2006-5701 vulnerability.
References
- http://projects.info-pull.com/mokb/MOKB-02-11-2006.html
- http://www.securityfocus.com/bid/20870
- http://secunia.com/advisories/22655
- http://www.ubuntu.com/usn/usn-395-1
- http://secunia.com/advisories/23361
- http://secunia.com/advisories/23384
- http://secunia.com/advisories/24259
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:047
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29967
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-5170: pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other…
Published: 2006-10-10T04:06:00 Last Modified: 2022-02-03T17:19:00
Summary
pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-5170 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207286
- https://issues.rpath.com/browse/RPL-680
- http://bugzilla.padl.com/show_bug.cgi?id=291
- http://www.debian.org/security/2006/dsa-1203
- http://www.securityfocus.com/bid/20880
- http://securitytracker.com/id?1017153
- http://secunia.com/advisories/22682
- http://secunia.com/advisories/22694
- http://secunia.com/advisories/22696
- http://rhn.redhat.com/errata/RHSA-2006-0719.html
- http://secunia.com/advisories/22869
- http://www.novell.com/linux/security/advisories/2006_27_sr.html
- http://secunia.com/advisories/23132
- http://security.gentoo.org/glsa/glsa-200612-19.xml
- http://secunia.com/advisories/23428
- http://www.trustix.org/errata/2006/0061/
- http://secunia.com/advisories/22685
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:201
- http://www.vupen.com/english/advisories/2006/4319
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10418
- http://www.securityfocus.com/archive/1/447859/100/200/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-0745: X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the…
Published: 2006-03-21T02:06:00 Last Modified: 2018-10-19T15:46:00
Summary
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2006-0745 vulnerability.
References
- http://www.securityfocus.com/bid/17169
- http://secunia.com/advisories/19311
- http://www.novell.com/linux/security/advisories/2006_16_xorgx11server.html
- http://www.redhat.com/archives/fedora-announce-list/2006-March/msg00026.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1
- http://www.osvdb.org/24000
- http://www.osvdb.org/24001
- http://securitytracker.com/id?1015793
- http://secunia.com/advisories/19256
- http://secunia.com/advisories/19307
- http://secunia.com/advisories/19316
- http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm
- http://secunia.com/advisories/19676
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:056
- http://securityreason.com/securityalert/606
- http://www.vupen.com/english/advisories/2006/1028
- http://www.vupen.com/english/advisories/2006/1017
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25341
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1697
- http://www.securityfocus.com/archive/1/428230/100/0/threaded
- http://www.securityfocus.com/archive/1/428183/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-0452: dn2ancestor in the LDAP component in Fedora Directory Server 1.0 allows remote attackers to cause…
Published: 2006-02-14T22:06:00 Last Modified: 2017-07-20T01:29:00
Summary
dn2ancestor in the LDAP component in Fedora Directory Server 1.0 allows remote attackers to cause a denial of service (CPU and memory consumption) via a ModDN operation with a DN that contains a large number of “,” (comma) characters, which results in a large amount of recursion, as demonstrated using the ProtoVer LDAP test suite.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-0452 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179137
- http://www.securityfocus.com/bid/16677
- http://secunia.com/advisories/18960
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24796
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-0451: Multiple memory leaks in the LDAP component in Fedora Directory Server 1.0 allow remote attackers…
Published: 2006-02-14T22:06:00 Last Modified: 2017-07-20T01:29:00
Summary
Multiple memory leaks in the LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (memory consumption) via invalid BER packets that trigger an error, which might prevent memory from being freed if it was allocated during the ber_scanf call, as demonstrated using the ProtoVer LDAP test suite.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-0451 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135
- http://www.securityfocus.com/bid/16677
- http://secunia.com/advisories/18960
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24794
See also: All popular products CVE Vulnerabilities of redhat
CVE-2006-0453: The LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of…
Published: 2006-02-14T22:06:00 Last Modified: 2017-07-20T01:29:00
Summary
The LDAP component in Fedora Directory Server 1.0 allow remote attackers to cause a denial of service (crash) via a certain “bad BER sequence” that results in a free of uninitialized memory, as demonstrated using the ProtoVer LDAP test suite.
Scores
- Impact Score: 6.9
- Exploitability Score: 10.0
- CVSS: 7.8
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
Impact
- Availability: COMPLETE
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2006-0453 vulnerability.
References
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=179135
- http://www.securityfocus.com/bid/16677
- http://secunia.com/advisories/18960
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24795
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3624: The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml,…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
Common Weakness Enumeration (CWE): CWE-189: Numeric Errors
CWE Description: Weaknesses in this category are related to improper calculation or conversion of numbers.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3624 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3626: Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3626 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
- http://secunia.com/advisories/18335
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3630: Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such…
Published: 2005-12-31T05:00:00 Last Modified: 2008-09-05T20:54:00
Summary
Fedora Directory Server before 10 allows remote attackers to obtain sensitive information, such as the password from adm.conf via an IFRAME element, probably involving an Apache httpd.conf configuration that orders “allow” directives before “deny” directives.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3630 vulnerability.
References
- http://directory.fedora.redhat.com/wiki/FDS10Announcement
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174837
- https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=121994
- http://www.securityfocus.com/bid/16729
- http://secunia.com/advisories/18939
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-3625: Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and…
Published: 2005-12-31T05:00:00 Last Modified: 2018-10-19T15:37:00
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka “Infinite CPU spins.”
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-3625 vulnerability.
References
- http://scary.beasts.org/security/CESA-2005-003.txt
- http://www.kde.org/info/security/advisory-20051207-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
- http://www.securityfocus.com/bid/16143
- http://secunia.com/advisories/18303
- http://secunia.com/advisories/18312
- http://secunia.com/advisories/18313
- http://secunia.com/advisories/18329
- http://secunia.com/advisories/18332
- http://secunia.com/advisories/18334
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
- http://secunia.com/advisories/18335
- http://www.debian.org/security/2005/dsa-931
- http://www.debian.org/security/2005/dsa-932
- http://www.debian.org/security/2005/dsa-937
- http://www.debian.org/security/2005/dsa-938
- http://www.debian.org/security/2005/dsa-940
- http://rhn.redhat.com/errata/RHSA-2006-0177.html
- http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
- http://secunia.com/advisories/18387
- http://secunia.com/advisories/18416
- http://secunia.com/advisories/18338
- http://secunia.com/advisories/18349
- http://secunia.com/advisories/18375
- http://secunia.com/advisories/18385
- http://secunia.com/advisories/18389
- http://secunia.com/advisories/18423
- http://secunia.com/advisories/18448
- http://www.debian.org/security/2006/dsa-936
- http://www.debian.org/security/2006/dsa-950
- http://www.redhat.com/support/errata/RHSA-2006-0160.html
- http://secunia.com/advisories/18398
- http://secunia.com/advisories/18407
- http://secunia.com/advisories/18534
- http://secunia.com/advisories/18582
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
- http://secunia.com/advisories/18517
- http://secunia.com/advisories/18554
- http://www.debian.org/security/2006/dsa-961
- http://www.debian.org/security/2006/dsa-962
- http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
- http://secunia.com/advisories/18642
- http://secunia.com/advisories/18644
- http://secunia.com/advisories/18674
- http://secunia.com/advisories/18675
- http://secunia.com/advisories/18679
- http://secunia.com/advisories/18908
- http://secunia.com/advisories/18913
- http://www.redhat.com/support/errata/RHSA-2006-0163.html
- ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
- http://www.trustix.org/errata/2006/0002/
- http://secunia.com/advisories/19230
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
- http://secunia.com/advisories/19377
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
- http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
- http://secunia.com/advisories/18425
- http://secunia.com/advisories/18463
- http://secunia.com/advisories/18147
- http://secunia.com/advisories/18373
- http://secunia.com/advisories/18380
- http://secunia.com/advisories/18414
- http://secunia.com/advisories/18428
- http://secunia.com/advisories/18436
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
- http://secunia.com/advisories/25729
- http://www.vupen.com/english/advisories/2007/2280
- http://www.vupen.com/english/advisories/2006/0047
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
- https://usn.ubuntu.com/236-1/
- http://www.securityfocus.com/archive/1/427990/100/0/threaded
- http://www.securityfocus.com/archive/1/427053/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-1267: The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the…
Published: 2005-06-10T04:00:00 Last Modified: 2018-10-19T15:31:00
Summary
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2005-1267 vulnerability.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208
- http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html
- http://www.trustix.org/errata/2005/0028/
- http://secunia.com/advisories/15634/
- http://www.debian.org/security/2005/dsa-854
- http://secunia.com/advisories/17118
- http://www.redhat.com/support/errata/RHSA-2005-505.html
- http://www.securityfocus.com/bid/13906
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148
- http://www.securityfocus.com/archive/1/430292/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0085: Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote…
Published: 2005-04-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0085 vulnerability.
References
- http://www.debian.org/security/2005/dsa-680
- http://www.securityfocus.com/bid/12442
- http://www.gentoo.org/security/en/glsa/glsa-200502-16.xml
- http://www.redhat.com/support/errata/RHSA-2005-073.html
- http://securitytracker.com/id?1013078
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.46/SCOSA-2005.46.txt
- http://secunia.com/advisories/14255
- http://secunia.com/advisories/17414
- http://secunia.com/advisories/17415
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00002.html
- http://secunia.com/advisories/14276
- http://secunia.com/advisories/14303
- http://secunia.com/advisories/14795
- http://secunia.com/advisories/15007
- http://www.redhat.com/support/errata/RHSA-2005-090.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:063
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19223
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10878
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0206: The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete…
Published: 2005-04-27T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0206 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2005-213.html
- http://www.securityfocus.com/bid/11501
- http://www.redhat.com/support/errata/RHSA-2005-034.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.redhat.com/support/errata/RHSA-2005-057.html
- http://www.redhat.com/support/errata/RHSA-2005-132.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:041
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:042
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:043
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:044
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:056
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0754: Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user,…
Published: 2005-04-22T04:00:00 Last Modified: 2016-10-18T03:14:00
Summary
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0754 vulnerability.
References
- http://www.kde.org/info/security/advisory-20050420-1.txt
- ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff
- http://secunia.com/advisories/15060
- http://www.securityfocus.com/bid/13313
- http://marc.info/?l=bugtraq&m=111419664411051&w=2
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0004: The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and…
Published: 2005-04-14T04:00:00 Last Modified: 2019-12-17T17:12:00
Summary
The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0004 vulnerability.
References
- http://www.debian.org/security/2005/dsa-647
- http://secunia.com/advisories/13867
- http://www.securityfocus.com/bid/12277
- http://lists.mysql.com/internals/20600
- http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:036
- http://marc.info/?l=bugtraq&m=110608297217224&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18922
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1235: Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux…
Published: 2005-04-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
Scores
- Impact Score: 10.0
- Exploitability Score: 1.9
- CVSS: 6.2
- CVSS Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: LOCAL
Exploits Database (Total Exploits Count: 3)
Code designed for conducting penetration testing on CVE-2004-1235 vulnerability.
- Linux Kernel 2.4.x/2.6.x - 'uselib()' Local Privilege Escalation (3) by sd at 2005-03-22
- Linux Kernel 2.4 - 'uselib()' Local Privilege Escalation (2) by Tim Hsu at 2005-01-27
- Linux Kernel 2.4.29-rc2 - 'uselib()' Local Privilege Escalation (1) by Paul Starzetz at 2005-01-07
References
- http://www.redhat.com/support/errata/RHSA-2005-043.html
- http://www.securityfocus.com/bid/12190
- http://isec.pl/vulnerabilities/isec-0021-uselib.txt
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
- http://www.securityfocus.com/advisories/7806
- http://www.securityfocus.com/advisories/7805
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2005-092.html
- http://www.trustix.org/errata/2005/0001/
- http://www.securityfocus.com/advisories/7804
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://secunia.com/advisories/20338
- http://www.novell.com/linux/security/advisories/2005_01_sr.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1082
- http://www.debian.org/security/2006/dsa-1069
- http://marc.info/?l=bugtraq&m=110512575901427&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18800
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0750: The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1…
Published: 2005-03-27T05:00:00 Last Modified: 2017-10-11T01:30:00
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 4)
Code designed for conducting penetration testing on CVE-2005-0750 vulnerability.
- Linux Kernel 2.4.x/2.6.x - 'Bluez' BlueTooth Signed Buffer Index Privilege Escalation (2) by qobaiashi at 2005-10-26
- Linux Kernel 2.4.30/2.6.11.5 - BlueTooth 'bluez_sock_create' Local Privilege Escalation by backdoored.net at 2005-10-19
- Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index Privilege Escalation (1) by qobaiashi at 2005-04-08
- Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC) by ilja van sprundel at 2005-03-28
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html
- http://www.redhat.com/support/errata/RHSA-2005-283.html
- http://www.redhat.com/support/errata/RHSA-2005-284.html
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- http://www.securityfocus.com/bid/12911
- http://marc.info/?l=bugtraq&m=111204562102633&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19844
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0736: Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local…
Published: 2005-03-09T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2005-0736 vulnerability.
- Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation by alert7 at 2005-12-30
- Linux Kernel 2.6.x - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation (1) by sd at 2005-03-09
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html
- http://www.novell.com/linux/security/advisories/2005_18_kernel.html
- http://www.securityfocus.com/bid/12763
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.redhat.com/support/errata/RHSA-2005-366.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870
- http://linux.bkbits.net:8080/linux-2.6/cset@422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html |ChangeSet@-1d
- https://usn.ubuntu.com/95-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0667: Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers…
Published: 2005-03-07T05:00:00 Last Modified: 2008-09-05T20:46:00
Summary
Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0667 vulnerability.
References
- http://sylpheed.good-day.net/changelog.html.en
- http://sylpheed.good-day.net/changelog-devel.html.en
- http://www.gentoo.org/security/en/glsa/glsa-200503-26.xml
- http://www.redhat.com/support/errata/RHSA-2005-303.html
- http://securitytracker.com/id?1013376
- http://secunia.com/advisories/14491
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0109: Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel…
Published: 2005-03-05T05:00:00 Last Modified: 2018-10-16T12:06:00
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
Scores
- Impact Score: 6.9
- Exploitability Score: 3.4
- CVSS: 4.7
- CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: COMPLETE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2005-0109 vulnerability.
References
- http://www.securityfocus.com/bid/12724
- http://www.daemonology.net/papers/htt.pdf
- http://www.daemonology.net/hyperthreading-considered-harmful/
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1
- http://www.kb.cert.org/vuls/id/911878
- http://securitytracker.com/id?1013967
- http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754
- http://secunia.com/advisories/15348
- http://secunia.com/advisories/18165
- http://www.redhat.com/support/errata/RHSA-2005-476.html
- http://www.redhat.com/support/errata/RHSA-2005-800.html
- http://www.vupen.com/english/advisories/2005/3002
- http://www.vupen.com/english/advisories/2005/0540
- http://marc.info/?l=freebsd-security&m=110994370429609&w=2
- http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2
- http://marc.info/?l=openbsd-misc&m=110995101417256&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0605: scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value…
Published: 2005-03-02T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0605 vulnerability.
References
- https://bugs.freedesktop.org/attachment.cgi?id=1909
- http://security.gentoo.org/glsa/glsa-200503-08.xml
- http://www.gentoo.org/security/en/glsa/glsa-200503-15.xml
- http://bugs.gentoo.org/show_bug.cgi?id=83655
- http://bugs.gentoo.org/show_bug.cgi?id=83598
- http://www.redhat.com/support/errata/RHSA-2005-331.html
- http://securitytracker.com/id?1013339
- http://www.securityfocus.com/bid/12714
- http://www.debian.org/security/2005/dsa-723
- http://www.redhat.com/support/errata/RHSA-2005-412.html
- http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
- http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt
- http://secunia.com/advisories/14460
- http://secunia.com/advisories/18049
- ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt
- http://secunia.com/advisories/18316
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
- http://www.redhat.com/support/errata/RHSA-2005-044.html
- http://www.redhat.com/support/errata/RHSA-2005-198.html
- http://www.redhat.com/support/errata/RHSA-2005-473.html
- ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
- http://secunia.com/advisories/19624
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10411
- https://usn.ubuntu.com/97-1/
- https://usn.ubuntu.com/92-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0989: Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may…
Published: 2005-03-01T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0989 vulnerability.
References
- http://www.securityfocus.com/bid/11526
- http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html
- http://www.debian.org/security/2004/dsa-582
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890
- http://www.redhat.com/support/errata/RHSA-2004-615.html
- http://www.redhat.com/support/errata/RHSA-2004-650.html
- http://www.novell.com/linux/security/advisories/2005_01_sr.html
- http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml
- http://www.ciac.org/ciac/bulletins/p-029.shtml
- http://www.osvdb.org/11179
- http://www.osvdb.org/11180
- http://www.osvdb.org/11324
- http://securitytracker.com/id?1011941
- http://secunia.com/advisories/13000
- http://marc.info/?l=bugtraq&m=109880813013482&w=2
- https://www.ubuntu.com/usn/usn-89-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17876
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17875
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17872
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17870
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0986: Iptables before 1.2.11, under certain conditions, does not properly load the required modules at…
Published: 2005-03-01T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0986 vulnerability.
References
- http://www.securityfocus.com/bid/11570
- http://www.debian.org/security/2004/dsa-580
- https://bugzilla.fedora.us/show_bug.cgi?id=2252
- http://www.ciac.org/ciac/bulletins/p-026.shtml
- http://rpmfind.net/linux/RPM/suse/updates/9.2/i386/rpm/i586/iptables-1.2.11-4.2.i586.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:125
- https://www.ubuntu.com/usn/usn-81-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17928
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0974: The netatalk package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating…
Published: 2005-02-09T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
The netatalk package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0974 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200410-25.xml
- http://www.trustix.org/errata/2004/0050
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0960: FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0960 vulnerability.
References
- http://www.securityfocus.com/bid/11222
- http://www.kb.cert.org/vuls/id/541574
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11023
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0961: Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service…
Published: 2005-02-09T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0961 vulnerability.
References
- http://www.securityfocus.com/bid/11222
- http://www.kb.cert.org/vuls/id/541574
- http://security.gentoo.org/glsa/glsa-200409-29.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17440
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10024
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0156: Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support…
Published: 2005-02-07T05:00:00 Last Modified: 2018-08-13T21:47:00
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2005-0156 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml
- http://www.redhat.com/support/errata/RHSA-2005-103.html
- http://www.redhat.com/support/errata/RHSA-2005-105.html
- http://www.trustix.org/errata/2005/0003/
- http://www.securityfocus.com/bid/12426
- http://secunia.com/advisories/14120
- http://fedoranews.org/updates/FEDORA--.shtml
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:031
- http://secunia.com/advisories/55314
- http://marc.info/?l=bugtraq&m=110737149402683&w=2
- http://marc.info/?l=full-disclosure&m=110779721503111&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19208
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803
- http://www.digitalmunition.com/DMA[2005-0131b].txt
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0902: Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla…
Published: 2005-01-27T05:00:00 Last Modified: 2018-05-03T01:29:00
Summary
Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the “Send page” functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0902 vulnerability.
References
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://bugzilla.mozilla.org/show_bug.cgi?id=258005
- http://bugzilla.mozilla.org/show_bug.cgi?id=245066
- http://bugzilla.mozilla.org/show_bug.cgi?id=226669
- http://bugzilla.mozilla.org/show_bug.cgi?id=256316
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17379
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17378
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11201
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0930: The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0930 vulnerability.
References
- http://www.idefense.com/application/poi/display?id=156&type=vulnerabilities&flashstatus=false
- http://www.securityfocus.com/bid/11624
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- http://www.gentoo.org/security/en/glsa/glsa-200411-21.xml
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
- ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
- http://www.novell.com/linux/security/advisories/2004_40_samba.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101783-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:131
- http://marc.info/?l=bugtraq&m=110330519803655&w=2
- http://marc.info/?l=bugtraq&m=109993720717957&w=2
- https://www.ubuntu.com/usn/usn-22-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10936
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0918: The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Common Weakness Enumeration (CWE): CWE-399: Resource Management Errors
CWE Description: This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0918 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-591.html
- http://www.securityfocus.com/bid/11385
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923
- http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt
- http://fedoranews.org/updates/FEDORA--.shtml
- http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html
- http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
- http://secunia.com/advisories/30914
- http://secunia.com/advisories/30967
- http://www.squid-cache.org/Advisories/SQUID-2008_1.txt
- http://www.squid-cache.org/Advisories/SQUID-2004_3.txt
- http://www.vupen.com/english/advisories/2008/1969/references
- http://marc.info/?l=bugtraq&m=109913064629327&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17688
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0882: Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow…
Published: 2005-01-27T05:00:00 Last Modified: 2018-10-30T16:25:00
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small “maximum data bytes” value.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0882 vulnerability.
References
- http://www.trustix.net/errata/2004/0058/
- http://security.e-matters.de/advisories/132004.html
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
- ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
- http://www.novell.com/linux/security/advisories/2004_40_samba.html
- http://www.ciac.org/ciac/bulletins/p-038.shtml
- http://www.kb.cert.org/vuls/id/457622
- http://www.osvdb.org/11782
- http://securitytracker.com/id?1012235
- http://secunia.com/advisories/13189
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899
- http://marc.info/?l=bugtraq&m=110330519803655&w=2
- http://marc.info/?l=bugtraq&m=110055646329581&w=2
- http://marc.info/?l=bugtraq&m=110054671403755&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18070
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0886: Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0886 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-577.html
- http://www.securityfocus.com/bid/11406
- http://www.kde.org/info/security/advisory-20041209-2.txt
- http://www.debian.org/security/2004/dsa-567
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
- http://www.trustix.org/errata/2004/0054/
- http://www.kb.cert.org/vuls/id/687568
- http://www.ciac.org/ciac/bulletins/p-015.shtml
- http://secunia.com/advisories/12818
- http://securitytracker.com/id?1011674
- http://www.redhat.com/support/errata/RHSA-2005-021.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://marc.info/?l=bugtraq&m=109779465621929&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17715
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9907
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100116
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0888: Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0888 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-543.html
- http://www.securityfocus.com/bid/11501
- http://www.debian.org/security/2004/dsa-573
- http://www.debian.org/security/2004/dsa-581
- http://www.debian.org/security/2004/dsa-599
- http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
- http://www.redhat.com/support/errata/RHSA-2004-592.html
- http://www.redhat.com/support/errata/RHSA-2005-066.html
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:114
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:115
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:116
- https://bugzilla.fedora.us/show_bug.cgi?id=2353
- http://marc.info/?l=bugtraq&m=109880927526773&w=2
- http://marc.info/?l=bugtraq&m=110815379627883&w=2
- https://www.ubuntu.com/usn/usn-9-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17818
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0903: Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox…
Published: 2005-01-27T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to execute arbitrary code via malformed VCard attachments that are not properly handled when previewing a message.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0903 vulnerability.
References
- http://www.kb.cert.org/vuls/id/414240
- http://www.securityfocus.com/bid/11174
- http://bugzilla.mozilla.org/show_bug.cgi?id=257314
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17380
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10873
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0889: Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow…
Published: 2005-01-27T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0889 vulnerability.
References
- http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml
- http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml
- http://www.securityfocus.com/bid/11501
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:113
- http://marc.info/?l=bugtraq&m=109880927526773&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17819
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1184: The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute…
Published: 2005-01-21T05:00:00 Last Modified: 2018-10-19T15:30:00
Summary
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1184 vulnerability.
References
- http://www.debian.org/security/2005/dsa-654
- http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
- http://www.redhat.com/support/errata/RHSA-2005-040.html
- http://securitytracker.com/id?1012965
- http://www.securityfocus.com/bid/12329
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
- http://secunia.com/advisories/35074
- http://www.vupen.com/english/advisories/2009/1297
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://support.apple.com/kb/HT3549
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
- https://usn.ubuntu.com/68-1/
- http://www.securityfocus.com/archive/1/435199/100/0/threaded
- http://www.securityfocus.com/archive/1/419768/100/0/threaded
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0883: Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0883 vulnerability.
References
- http://www.securityfocus.com/bid/11695
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://security.e-matters.de/advisories/142004.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://secunia.com/advisories/13232/
- http://www.kb.cert.org/vuls/id/726198
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110082989725345&w=2
- http://marc.info/?l=bugtraq&m=110072140811965&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18136
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18135
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18134
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1158: Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the “window injection” vulnerability.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1158 vulnerability.
References
- http://www.securityfocus.com/bid/11853
- http://secunia.com/multiple_browsers_window_injection_vulnerability_test/
- http://secunia.com/secunia_research/2004-13/advisory/
- http://www.kde.org/info/security/advisory-20041213-1.txt
- http://www.redhat.com/support/errata/RHSA-2005-009.html
- http://secunia.com/advisories/13254
- http://secunia.com/advisories/13560
- http://secunia.com/advisories/13477
- http://secunia.com/advisories/13486
- http://www.novell.com/linux/security/advisories/2005_01_sr.html
- http://marc.info/?l=bugtraq&m=110296048613575&w=2
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11056
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1269: lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1269 vulnerability.
References
- http://tigger.uic.edu/~jlongs2/holes/cups2.txt
- http://www.redhat.com/support/errata/RHSA-2005-013.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18608
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545
- https://usn.ubuntu.com/50-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1011: Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus…
Published: 2005-01-10T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1011 vulnerability.
References
- http://security.e-matters.de/advisories/152004.html
- http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
- http://security.gentoo.org/glsa/glsa-200411-34.xml
- http://secunia.com/advisories/13274/
- http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:139
- http://marc.info/?l=bugtraq&m=110123023521619&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18198
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1071: The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1071 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9917
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1013: The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote…
Published: 2005-01-10T05:00:00 Last Modified: 2016-12-08T02:59:00
Summary
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) “body[p”, (2) “binary[p”, or (3) “binary[p”) that cause an index increment error that leads to an out-of-bounds memory corruption.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1013 vulnerability.
References
- http://www.debian.org/security/2004/dsa-597
- http://security.e-matters.de/advisories/152004.html
- http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
- http://security.gentoo.org/glsa/glsa-200411-34.xml
- http://secunia.com/advisories/13274/
- http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:139
- http://marc.info/?l=bugtraq&m=110123023521619&w=2
- https://www.ubuntu.com/usn/usn-31-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1073: The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1073 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://www.redhat.com/support/errata/RHSA-2006-0191.html
- http://secunia.com/advisories/18684
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1171: KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1) manually entered by the…
Published: 2005-01-10T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
KDE 3.2.x and 3.3.0 through 3.3.2, when saving credentials that are (1) manually entered by the user or (2) created by the SMB protocol handler, stores those credentials for plaintext in the user’s .desktop file, which may be created with world-readable permissions, which could allow local users to obtain usernames and passwords for remote resources such as SMB shares.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1171 vulnerability.
References
- http://www.securityfocus.com/bid/11866
- http://www.kb.cert.org/vuls/id/305294
- http://www.sec-consult.com/index.php?id=118
- http://www.kde.org/info/security/advisory-20041209-1.txt
- http://archives.neohapsis.com/archives/fulldisclosure/2004-11/1292.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-16.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:150
- http://www.ciac.org/ciac/bulletins/p-051.shtml
- http://www.osvdb.org/12248
- http://securitytracker.com/id?1012471
- http://secunia.com/advisories/13560
- http://secunia.com/advisories/13477
- http://secunia.com/advisories/13486
- http://marc.info/?l=bugtraq&m=110178786809694&w=2
- http://marc.info/?l=bugtraq&m=110261063201488&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18267
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1268: lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1268 vulnerability.
References
- http://tigger.uic.edu/~jlongs2/holes/cups2.txt
- http://www.redhat.com/support/errata/RHSA-2005-013.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18606
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10398
- https://usn.ubuntu.com/50-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0914: Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in libXpm for 6.8.1 and earlier, as used in XFree86 and other packages, include (1) multiple integer overflows, (2) out-of-bounds memory accesses, (3) directory traversal, (4) shell metacharacter, (5) endless loops, and (6) memory leaks, which could allow remote attackers to obtain sensitive information, cause a denial of service (application crash), or execute arbitrary code via a certain XPM image file. NOTE: it is highly likely that this candidate will be SPLIT into other candidates in the future, per CVE’s content decisions.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0914 vulnerability.
References
- http://www.securityfocus.com/bid/11694
- http://www.debian.org/security/2004/dsa-607
- http://www.gentoo.org/security/en/glsa/glsa-200411-28.xml
- http://www.x.org/pub/X11R6.8.1/patches/README.xorg-681-CAN-2004-0914.patch
- http://www.linuxsecurity.com/content/view/106877/102/
- http://www.gentoo.org/security/en/glsa/glsa-200502-06.xml
- http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml
- http://rhn.redhat.com/errata/RHSA-2004-537.html
- http://www.redhat.com/support/errata/RHSA-2005-004.html
- http://secunia.com/advisories/13224/
- http://www.ubuntu.com/usn/usn-83-1
- http://www.ubuntu.com/usn/usn-83-2
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228
- http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
- http://www.redhat.com/support/errata/RHSA-2004-610.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:137
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18147
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18146
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18145
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18144
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18142
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1015: Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option…
Published: 2005-01-10T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1015 vulnerability.
References
- http://security.gentoo.org/glsa/glsa-200411-34.xml
- http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
- http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:139
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18274
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1070: The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1070 vulnerability.
References
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1154: Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-30T16:25:00
Summary
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1154 vulnerability.
References
- http://www.kb.cert.org/vuls/id/226184
- http://www.samba.org/samba/security/CAN-2004-1154.html
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- http://www.debian.org/security/2005/dsa-701
- http://www.redhat.com/support/errata/RHSA-2005-020.html
- ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
- http://www.novell.com/linux/security/advisories/2004_45_samba.html
- http://secunia.com/advisories/13453/
- http://www.securityfocus.com/bid/11973
- http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18519
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0949: The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0949 vulnerability.
References
- http://www.securityfocus.com/bid/11695
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://security.e-matters.de/advisories/142004.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.trustix.org/errata/2004/0061/
- http://secunia.com/advisories/13232/
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- http://marc.info/?l=bugtraq&m=110072140811965&w=2
- https://www.ubuntu.com/usn/usn-30-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18137
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1012: The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote…
Published: 2005-01-10T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (“body[p”) that is treated as a different command (“body.peek”) and causes an index increment error that leads to an out-of-bounds memory corruption.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1012 vulnerability.
References
- http://security.e-matters.de/advisories/152004.html
- http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
- http://www.debian.org/security/2004/dsa-597
- http://security.gentoo.org/glsa/glsa-200411-34.xml
- http://secunia.com/advisories/13274/
- http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:139
- http://marc.info/?l=bugtraq&m=110123023521619&w=2
- https://www.ubuntu.com/usn/usn-31-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18199
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1067: Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads…
Published: 2005-01-10T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1067 vulnerability.
References
- http://www.securityfocus.com/bid/11738
- http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
- https://www.ubuntu.com/usn/usn-37-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18333
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1072: The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8,…
Published: 2005-01-10T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1072 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-537.html
- http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- http://www.redhat.com/support/errata/RHSA-2005-275.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://www.redhat.com/support/errata/RHSA-2004-504.html
- http://www.redhat.com/support/errata/RHSA-2004-505.html
- http://www.securityfocus.com/bid/11646
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U
- http://secunia.com/advisories/19607
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11195
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1267: Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.0
- CVSS: 6.5
- CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: SINGLE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1267 vulnerability.
References
- http://tigger.uic.edu/~jlongs2/holes/cups.txt
- http://www.redhat.com/support/errata/RHSA-2005-013.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18604
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10620
- https://usn.ubuntu.com/50-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1270: lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1,…
Published: 2005-01-10T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: NONE
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-1270 vulnerability.
References
- http://tigger.uic.edu/~jlongs2/holes/cups2.txt
- http://www.redhat.com/support/errata/RHSA-2005-013.html
- http://www.redhat.com/support/errata/RHSA-2005-053.html
- http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18609
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11507
- https://usn.ubuntu.com/50-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0802: Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute…
Published: 2004-12-31T05:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0802 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870
- http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089
- http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html
- http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup
- http://www.securityfocus.com/bid/11084
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17183
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0817: Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to…
Published: 2004-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0817 vulnerability.
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870
- http://www.debian.org/security/2004/dsa-548
- http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml
- http://www.redhat.com/support/errata/RHSA-2004-465.html
- http://www.securityfocus.com/bid/11084
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:089
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17182
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0904: Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release,…
Published: 2004-12-31T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0904 vulnerability.
References
- http://www.kb.cert.org/vuls/id/847200
- http://www.securityfocus.com/bid/11171
- http://bugzilla.mozilla.org/show_bug.cgi?id=255067
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17381
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10952
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0803: Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier,…
Published: 2004-12-23T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0803 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-577.html
- http://www.kb.cert.org/vuls/id/948752
- http://www.debian.org/security/2004/dsa-567
- http://scary.beasts.org/security/CESA-2004-006.txt
- http://www.kde.org/info/security/advisory-20041209-2.txt
- http://www.gentoo.org/security/en/glsa/glsa-200410-11.xml
- http://www.redhat.com/support/errata/RHSA-2005-354.html
- http://www.novell.com/linux/security/advisories/2004_38_libtiff.html
- http://www.securityfocus.com/bid/11406
- http://secunia.com/advisories/12818
- http://www.redhat.com/support/errata/RHSA-2005-021.html
- http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000888
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-101677-1
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:109
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:052
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201072-1
- http://marc.info/?l=bugtraq&m=109778785107450&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17703
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8896
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100114
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1333: Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows…
Published: 2004-12-15T05:00:00 Last Modified: 2018-10-03T21:29:00
Summary
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1333 vulnerability.
References
- http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html
- http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html
- http://www.novell.com/linux/security/advisories/2005_18_kernel.html
- http://www.securityfocus.com/bid/11956
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532
- http://secunia.com/advisories/17826
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://secunia.com/advisories/20162
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18523
- https://usn.ubuntu.com/47-1/
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1335: Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users…
Published: 2004-12-15T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-1335 vulnerability.
References
- http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html
- http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html
- http://www.securityfocus.com/bid/11956
- http://www.redhat.com/support/errata/RHSA-2005-016.html
- http://www.debian.org/security/2006/dsa-1070
- http://www.debian.org/security/2006/dsa-1067
- http://www.debian.org/security/2006/dsa-1069
- http://www.redhat.com/support/errata/RHSA-2005-017.html
- http://secunia.com/advisories/20163
- http://secunia.com/advisories/20202
- http://www.debian.org/security/2006/dsa-1082
- http://secunia.com/advisories/20338
- http://marc.info/?l=bugtraq&m=110383108211524&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18524
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11085
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0619: Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows…
Published: 2004-12-06T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.
Scores
- Impact Score: 10.0
- Exploitability Score: 3.9
- CVSS: 7.2
- CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0619 vulnerability.
References
- http://www.securityfocus.com/bid/10599
- http://www.redhat.com/support/errata/RHSA-2004-549.html
- http://www.redhat.com/support/errata/RHSA-2005-283.html
- http://www.ciac.org/ciac/bulletins/p-047.shtml
- http://secunia.com/advisories/11936
- http://marc.info/?l=bugtraq&m=108802653409053&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16459
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9773
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0415: Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local…
Published: 2004-11-23T05:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0415 vulnerability.
References
- http://www.redhat.com/support/errata/RHSA-2004-418.html
- http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:087
- http://www.redhat.com/support/errata/RHSA-2004-413.html
- ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16877
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9965
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-1613: Mozilla allows remote attackers to cause a denial of service (application crash from null…
Published: 2004-10-18T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Mozilla allows remote attackers to cause a denial of service (application crash from null dereference or infinite loop) via a web page that contains a (1) TEXTAREA, (2) INPUT, (3) FRAMESET or (4) IMG tag followed by a null character and some trailing characters, as demonstrated by mangleme.
Scores
- Impact Score: 2.9
- Exploitability Score: 10.0
- CVSS: 5.0
- CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-1613 vulnerability.
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html
- http://lcamtuf.coredump.cx/mangleme/gallery/
- http://www.redhat.com/support/errata/RHSA-2005-323.html
- http://www.securityfocus.com/bid/11439
- http://securitytracker.com/id?1011810
- http://marc.info/?l=bugtraq&m=109811406620511&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17805
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10227
See also: All popular products CVE Vulnerabilities of redhat
CVE-2005-0373: Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in…
Published: 2004-10-07T04:00:00 Last Modified: 2017-07-11T01:32:00
Summary
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2005-0373 vulnerability.
References
- https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup
- https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171
- http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html
- http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml
- http://www.linuxcompatible.org/print42495.html
- http://www.securityfocus.com/bid/11347
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17642
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0827: Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before…
Published: 2004-09-16T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
Scores
- Impact Score: 6.4
- Exploitability Score: 10.0
- CVSS: 7.5
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0827 vulnerability.
References
- http://www.debian.org/security/2004/dsa-547
- http://www.redhat.com/support/errata/RHSA-2004-480.html
- http://www.redhat.com/support/errata/RHSA-2004-494.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1
- http://secunia.com/advisories/28800
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1
- http://www.vupen.com/english/advisories/2008/0412
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17173
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0905: Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8…
Published: 2004-09-14T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.
Scores
- Impact Score: 6.4
- Exploitability Score: 3.9
- CVSS: 4.6
- CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0905 vulnerability.
References
- http://www.mozilla.org/projects/security/known-vulnerabilities.html#mozilla1.7.3
- http://bugzilla.mozilla.org/show_bug.cgi?id=250862
- http://security.gentoo.org/glsa/glsa-200409-26.xml
- http://www.novell.com/linux/security/advisories/2004_36_mozilla.html
- http://www.us-cert.gov/cas/techalerts/TA04-261A.html
- http://www.kb.cert.org/vuls/id/651928
- http://www.securityfocus.com/bid/11177
- http://marc.info/?l=bugtraq&m=109698896104418&w=2
- http://marc.info/?l=bugtraq&m=109900315219363&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10378
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0234: Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as…
Published: 2004-08-18T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.
Common Weakness Enumeration (CWE): CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE Description: The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0234 vulnerability.
References
- http://www.securityfocus.com/bid/10243
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020778.html
- http://www.debian.org/security/2004/dsa-515
- http://www.redhat.com/support/errata/RHSA-2004-178.html
- http://www.redhat.com/support/errata/RHSA-2004-179.html
- http://security.gentoo.org/glsa/glsa-200405-02.xml
- http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840
- http://archives.neohapsis.com/archives/bugtraq/2006-04/0059.html
- http://www.guay-leroux.com/projects/barracuda-advisory-LHA.txt
- http://www.osvdb.org/5753
- http://www.osvdb.org/5754
- http://securitytracker.com/id?1015866
- http://secunia.com/advisories/19514
- http://www.vupen.com/english/advisories/2006/1220
- https://bugzilla.fedora.us/show_bug.cgi?id=1833
- http://marc.info/?l=bugtraq&m=108422737918885&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9881
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A977
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0235: Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to…
Published: 2004-08-18T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").
Scores
- Impact Score: 4.9
- Exploitability Score: 10.0
- CVSS: 6.4
- CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Impact
- Availability: NONE
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0235 vulnerability.
References
- http://www.securityfocus.com/bid/10243
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/020776.html
- http://www.debian.org/security/2004/dsa-515
- https://bugzilla.fedora.us/show_bug.cgi?id=1833
- http://www.redhat.com/support/errata/RHSA-2004-178.html
- http://www.redhat.com/support/errata/RHSA-2004-179.html
- http://security.gentoo.org/glsa/glsa-200405-02.xml
- http://www.redhat.com/archives/fedora-announce-list/2004-May/msg00005.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000840
- http://marc.info/?l=bugtraq&m=108422737918885&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16013
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A978
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10409
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0461: The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that…
Published: 2004-08-06T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overflow vulnerabilities that enable a denial of service (server crash) and possibly execute arbitrary code.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0461 vulnerability.
References
- http://www.securityfocus.com/bid/10591
- http://www.us-cert.gov/cas/techalerts/TA04-174A.html
- http://www.kb.cert.org/vuls/id/654390
- http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html
- http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf
- http://secunia.com/advisories/23265
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:061
- http://marc.info/?l=bugtraq&m=108795911203342&w=2
- http://marc.info/?l=bugtraq&m=108843959502356&w=2
- http://marc.info/?l=bugtraq&m=108938625206063&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16476
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0460: Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and…
Published: 2004-08-06T04:00:00 Last Modified: 2017-07-11T01:30:00
Summary
Buffer overflow in the logging capability for the DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13 allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via multiple hostname options in (1) DISCOVER, (2) OFFER, (3) REQUEST, (4) ACK, or (5) NAK messages, which can generate a long string when writing to a log file.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Currently, there is no code for exploiting the CVE-2004-0460 vulnerability.
References
- http://www.securityfocus.com/bid/10590
- http://www.us-cert.gov/cas/techalerts/TA04-174A.html
- http://www.kb.cert.org/vuls/id/317350
- http://www.novell.com/linux/security/advisories/2004_19_dhcp_server.html
- http://www.xerox.com/downloads/usa/en/c/cert_XRX06_004_v11.pdf
- http://secunia.com/advisories/23265
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:061
- http://marc.info/?l=bugtraq&m=108795911203342&w=2
- http://marc.info/?l=bugtraq&m=108843959502356&w=2
- http://marc.info/?l=bugtraq&m=108938625206063&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16475
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0557: Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX)…
Published: 2004-08-06T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields.
Scores
- Impact Score: 10.0
- Exploitability Score: 10.0
- CVSS: 10.0
- CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact
- Availability: COMPLETE
- Confidentiality: COMPLETE
- Integrity: COMPLETE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: NETWORK
Exploits Database (Total Exploits Count: 2)
Code designed for conducting penetration testing on CVE-2004-0557 vulnerability.
- SoX - '.wav' Local Buffer Overflow by Rave at 2004-08-04
- SoX - Local Buffer Overflow by Serkan Akpolat at 2004-08-01
References
- http://www.securityfocus.com/bid/10819
- http://www.gentoo.org/security/en/glsa/glsa-200407-23.xml
- http://www.redhat.com/support/errata/RHSA-2004-409.html
- http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0014.html
- http://www.debian.org/security/2004/dsa-565
- http://lwn.net/Articles/95530/
- http://lwn.net/Articles/95529/
- https://bugzilla.fedora.us/show_bug.cgi?id=1945
- http://secunia.com/advisories/12175
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000855
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:076
- http://seclists.org/fulldisclosure/2004/Jul/1227.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16827
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9801
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0587: Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to…
Published: 2004-08-06T04:00:00 Last Modified: 2017-10-11T01:29:00
Summary
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
Scores
- Impact Score: 2.9
- Exploitability Score: 3.9
- CVSS: 2.1
- CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
Impact
- Availability: PARTIAL
- Confidentiality: NONE
- Integrity: NONE
Access
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Currently, there is no code for exploiting the CVE-2004-0587 vulnerability.
References
- http://www.securityfocus.com/bid/10279
- http://lwn.net/Articles/91155/
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
- http://www.redhat.com/support/errata/RHSA-2004-413.html
- http://www.redhat.com/support/errata/RHSA-2004-418.html
- ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc
- http://www.novell.com/linux/security/advisories/2004_10_kernel.html
- http://securitytracker.com/id?1010057
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16062
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9398
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0595: The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0)…
Published: 2004-07-27T04:00:00 Last Modified: 2018-10-30T16:25:00
Summary
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Scores
- Impact Score: 6.4
- Exploitability Score: 8.6
- CVSS: 6.8
- CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: MEDIUM
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0595 vulnerability.
References
- http://www.securityfocus.com/bid/10724
- http://www.debian.org/security/2004/dsa-531
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023909.html
- http://www.debian.org/security/2005/dsa-669
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068
- http://www.redhat.com/support/errata/RHSA-2004-392.html
- http://www.redhat.com/support/errata/RHSA-2004-395.html
- http://www.redhat.com/support/errata/RHSA-2004-405.html
- http://www.novell.com/linux/security/advisories/2004_21_php4.html
- http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847
- http://www.redhat.com/support/errata/RHSA-2005-816.html
- http://marc.info/?l=bugtraq&m=109051444105182&w=2
- http://marc.info/?l=bugtraq&m=108981780109154&w=2
- http://marc.info/?l=bugtraq&m=109181600614477&w=2
- http://marc.info/?l=bugtraq&m=108982983426031&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16692
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10619
See also: All popular products CVE Vulnerabilities of redhat
CVE-2004-0594: The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain…
Published: 2004-07-27T04:00:00 Last Modified: 2018-10-30T16:25:00
Summary
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote attackers to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init function and overwriting a HashTable destructor pointer before the initialization of key data structures is complete.
Scores
- Impact Score: 6.4
- Exploitability Score: 4.9
- CVSS: 5.1
- CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact
- Availability: PARTIAL
- Confidentiality: PARTIAL
- Integrity: PARTIAL
Access
- Authentication: NONE
- Complexity: HIGH
- Vector: NETWORK
Exploits Database (Total Exploits Count: 1)
Code designed for conducting penetration testing on CVE-2004-0594 vulnerability.
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023908.html
- http://www.debian.org/security/2004/dsa-531
- http://www.debian.org/security/2005/dsa-669
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068
- http://www.redhat.com/support/errata/RHSA-2004-392.html
- http://www.redhat.com/support/errata/RHSA-2004-395.html
- http://www.redhat.com/support/errata/RHSA-2004-405.html
- http://www.novell.com/linux/security/advisories/2004_21_php4.html
- http://www.trustix.org/errata/2004/0039/
- http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847
- http://www.redhat.com/support/errata/RHSA-2005-816.html
- http://www.securityfocus.com/bid/10725
- http://marc.info/?l=bugtraq&m=109051444105182&w=2
- http://marc.info/?l=bugtraq&m=108981780109154&w=2
- http://marc.info/?l=bugtraq&m=109181600614477&w=2
- http://marc.info/?l=bugtraq&m=108982983426031&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16693
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10896
See also: All popular products CVE Vulnerabilities of redhat