This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Immunix First view 2000-10-18
Product Immunix Last view 2003-06-16
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:* 19
cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:* 13
cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:* 7
cpe:2.3:a:immunix:immunix:7:*:*:*:*:*:*:* 1

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2003-06-16 CVE-2002-1565

Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.

7.2 2002-08-12 CVE-2000-1208

Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.

9.8 2002-03-15 CVE-2002-0083

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.

5 2001-10-18 CVE-2001-0738

LogLine function in klogd in sysklogd 1.3 in various Linux distributions allows an attacker to cause a denial of service (hang) by causing null bytes to be placed in log messages.

2.1 2001-10-18 CVE-2001-0736

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

4.6 2001-09-20 CVE-2001-0641

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

7.5 2001-07-18 CVE-2001-1030

Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.

7.5 2001-06-27 CVE-2001-0473

Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.

2.1 2001-06-27 CVE-2001-0416

sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools.

2.1 2001-03-26 CVE-2001-0170

glibc 2.1.9x and earlier does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.

1.2 2001-03-12 CVE-2001-0143

vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.

1.2 2001-03-12 CVE-2001-0142

squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations.

1.2 2001-03-12 CVE-2001-0140

arpwatch 2.1a4 allows local users to overwrite arbitrary files via a symlink attack in some configurations.

1.2 2001-03-12 CVE-2001-0139

inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.

1.2 2001-03-12 CVE-2001-0138

privatepw program in wu-ftpd before 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack.

1.2 2001-03-12 CVE-2001-0120

useradd program in shadow-utils program may allow local users to overwrite arbitrary files via a symlink attack.

1.2 2001-03-12 CVE-2001-0119

getty_ps 2.0.7j allows local users to overwrite arbitrary files via a symlink attack.

1.2 2001-03-12 CVE-2001-0118

rdist 6.1.5 allows local users to overwrite arbitrary files via a symlink attack.

1.2 2001-03-12 CVE-2001-0117

sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.

1.2 2001-03-12 CVE-2001-0116

gpm 1.19.3 allows local users to overwrite arbitrary files via a symlink attack.

7.2 2001-01-09 CVE-2000-1134

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

7.2 2001-01-09 CVE-2000-1095

modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.

7.2 2000-12-19 CVE-2000-0963

Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS.

10 2000-11-14 CVE-2000-0844

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.

4.6 2000-10-18 CVE-2000-1214

Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-264 Permissions, Privileges, and Access Controls
50% (1) CWE-193 Off-by-one Error

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:4047 Shell Redirect Symlink Attack Vulnerability

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
14794 Multiple Unix Vendor locale subsystem Multiple Function Format String
14158 Multiple Unix Shell << Redirect Symlink Arbitrary File Overwrite
13792 iputils ping Multiple Parameter Local Overflows
13789 iputils ping Raw Socket Acquisition Privilege Drop Failure
13765 BSD-based lpr Package startprinting() Function Local Format String
11765 pico Symlink Arbitrary File Overwrite
8866 GNU wget url_filename() Function Overflow DoS
6142 Multiple Vendor libncurses TERM / TERMINFO_DIRS Overflow
5615 Mutt IMAP Handling Remote Format String
5555 sysklogd LogLine Function Null Byte DoS
5476 Squid HTTP Accelerator Mode ACL Bypass
1821 man -S Option Local Overflow
1778 sgml-tools Symlink Arbitrary File Access
1723 shadow-utils /etc/default Temp File Race Condition
1722 rdist /tmp File Race Condition
1721 getty_ps /tmp File Race Condition
1718 sdiff /tmp File Race Condition
1717 INN /tmp Symlink Arbitrary File Overwrite
1716 WU-FTPD privatepw Symlink Arbitrary File Overwrite
1715 gpm /tmp File Race Condition
1713 Linuxconf /tmp File Race Condition
1712 Squid Email Notification /tmp Symlink Arbitrary File Overwrite
1711 arpwatch /tmp File Race Condition
1710 GNU libc (glibc) Multiple Environment Variable Arbitrary File Access
1641 Linux modprobe popen Function Arbitrary Command Execution

OpenVAS Exploits

id Description
2009-06-03 Name : Solaris Update for csh/pfcsh 110898-15
File : nvt/gb_solaris_110898_15.nasl
2009-05-05 Name : HP-UX Update for Shells HPSBUX00275
File : nvt/gb_hp_ux_HPSBUX00275.nasl
2008-01-17 Name : Debian Security Advisory DSA 016-1 (wu-ftpd)
File : nvt/deb_016_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 019-1 (squid)
File : nvt/deb_019_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 038-1 (sgml-tools)
File : nvt/deb_038_1.nasl
2005-11-03 Name : OpenSSH Channel Code Off by 1
File : nvt/openssh_channel.nasl

Snort® IPS/IDS

Date Description
2014-01-10 resolv_host_conf
RuleID : 714-community - Type : PROTOCOL-TELNET - Revision : 15
2014-01-10 resolv_host_conf
RuleID : 714 - Type : PROTOCOL-TELNET - Revision : 15

Nessus® Vulnerability Scanner

id Description
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-031.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-030.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2001-011.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-054.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-071.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-075.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-001.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-002.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-003.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-004.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2001-006.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-007.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2001-010.nasl - Type: ACT_GATHER_INFO
2011-08-29 Name: The SSH service running on the remote host has an information disclosure vuln...
File: sunssh_plaintext_recovery.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-209.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-038.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-019.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-016.nasl - Type: ACT_GATHER_INFO
2004-07-31 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-047.nasl - Type: ACT_GATHER_INFO
2004-07-31 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-066.nasl - Type: ACT_GATHER_INFO
2004-07-31 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2002-019.nasl - Type: ACT_GATHER_INFO
2004-07-06 Name: The remote Red Hat host is missing a security update.
File: redhat-RHSA-2003-372.nasl - Type: ACT_GATHER_INFO
2002-03-07 Name: Arbitrary code may be run on the remote host.
File: openssh_channel.nasl - Type: ACT_GATHER_INFO
2001-11-20 Name: The remote host has an application that is affected by multiple vulnerabilities.
File: openssh_301.nasl - Type: ACT_GATHER_INFO