Summary
Detail | |||
---|---|---|---|
Vendor | Redhat | First view | 1999-06-30 |
Product | Linux | Last view | 2001-12-21 |
Version | 5.2 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:redhat:linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.6 | 2001-12-21 | CVE-2001-0886 | Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. |
2.1 | 2001-10-18 | CVE-2001-0736 | Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack. |
4.6 | 2001-09-20 | CVE-2001-0641 | Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. |
7.5 | 2001-06-27 | CVE-2001-0473 | Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands. |
7.2 | 2001-05-28 | CVE-2001-1028 | Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges. |
7.2 | 2001-01-09 | CVE-2000-1134 | Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. |
7.2 | 2000-12-19 | CVE-2000-0934 | Glint in Red Hat Linux 5.2 allows local users to overwrite arbitrary files and cause a denial of service via a symlink attack. |
7.2 | 2000-11-14 | CVE-2000-0867 | Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages. |
10 | 2000-11-14 | CVE-2000-0844 | Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. |
7.2 | 2000-06-21 | CVE-2000-0607 | Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings. |
7.2 | 2000-06-21 | CVE-2000-0606 | Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter. |
7.2 | 2000-02-26 | CVE-2000-0170 | Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable. |
7.5 | 1999-12-20 | CVE-1999-0997 | wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. |
4.6 | 1999-10-07 | CVE-1999-1347 | Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm. |
7.5 | 1999-10-07 | CVE-1999-1346 | PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file. |
6.4 | 1999-08-19 | CVE-1999-0740 | Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable. |
7.5 | 1999-07-25 | CVE-1999-0710 | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. |
2.1 | 1999-06-30 | CVE-1999-1348 | Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
14794 | Multiple Unix Vendor locale subsystem Multiple Function Format String |
14158 | Multiple Unix Shell << Redirect Symlink Arbitrary File Overwrite |
13499 | Red Hat Linux Xsession .xsession Restricted Account Bypass |
13026 | Red Hat Linux rlogin PAM Config File Malformed Ruleset |
12029 | Kanji on Console (KON) kon -StartupMessage Parameter Local Overflow |
11765 | pico Symlink Arbitrary File Overwrite |
11526 | Linux Console (KON) kon Overflow |
11524 | Kanji on Console (KON) fld Input File Overflow |
6069 | Linuxconf Improper PAM Shutdown DoS |
5824 | klogd Malformed Kernel Message Format String |
5615 | Mutt IMAP Handling Remote Format String |
5478 | man ultimate_source Function Local Overflow |
2007 | GNU libc (glibc) glob Function Remote Overflow |
1821 | man -S Option Local Overflow |
1736 | WU-FTPD FTP Conversion Malformed File Name Handling Arbitrary Command Execution |
1566 | Red Hat Glint /tmp Symbolic Link |
1233 | Linux man MANPAGER Variable Local Overflow |
1051 | Linux in.telnetd Malformed TERM Variable DoS |
28 | Squid cachemgr.cgi Proxied Port Scanning |
OpenVAS Exploits
id | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for squid File : nvt/sles9p5015546.nasl |
2009-06-03 | Name : Solaris Update for csh/pfcsh 110898-15 File : nvt/gb_solaris_110898_15.nasl |
2009-05-05 | Name : HP-UX Update for Shells HPSBUX00275 File : nvt/gb_hp_ux_HPSBUX00275.nasl |
2008-09-04 | Name : FreeBSD Ports: squid File : nvt/freebsd_squid13.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 103-1 (glibc) File : nvt/deb_103_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 377-1 (wu-ftpd) File : nvt/deb_377_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 576-1 (squid) File : nvt/deb_576_1.nasl |
2005-11-03 | Name : RedHat 6.0 cachemgr.cgi File : nvt/cachemgr_cgi.nasl |
2005-11-03 | Name : wu-ftpd SITE EXEC vulnerability File : nvt/wu_ftpd_site_exec.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2003-259-03 WU-FTPD Security Advisory File : nvt/esoft_slk_ssa_2003_259_03.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | tar parameters RuleID : 362-community - Type : PROTOCOL-FTP - Revision : 20 |
2014-01-10 | tar parameters RuleID : 362 - Type : PROTOCOL-FTP - Revision : 20 |
2014-01-10 | format string attempt RuleID : 1530 - Type : FTP - Revision : 14 |
2014-01-10 | wu-ftp bad file completion attempt RuleID : 1378-community - Type : PROTOCOL-FTP - Revision : 24 |
2014-01-10 | wu-ftp bad file completion attempt RuleID : 1378 - Type : PROTOCOL-FTP - Revision : 24 |
2014-01-10 | wu-ftp bad file completion attempt RuleID : 1377-community - Type : PROTOCOL-FTP - Revision : 24 |
2014-01-10 | wu-ftp bad file completion attempt RuleID : 1377 - Type : PROTOCOL-FTP - Revision : 24 |
2014-01-10 | cachemgr.cgi access RuleID : 1206-community - Type : SERVER-WEBAPP - Revision : 18 |
2014-01-10 | cachemgr.cgi access RuleID : 1206 - Type : SERVER-WEBAPP - Revision : 18 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2000-050.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2000-075.nasl - Type: ACT_GATHER_INFO |
2012-09-06 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2001-031.nasl - Type: ACT_GATHER_INFO |
2006-07-03 | Name: The remote CentOS host is missing a security update. File: centos_RHSA-2005-415.nasl - Type: ACT_GATHER_INFO |
2005-07-13 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_a395397cc7c811d99e1ec296ac722cb3.nasl - Type: ACT_GATHER_INFO |
2005-06-16 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2005-415.nasl - Type: ACT_GATHER_INFO |
2005-06-13 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2005-489.nasl - Type: ACT_GATHER_INFO |
2005-05-19 | Name: The remote Fedora Core host is missing a security update. File: fedora_2005-373.nasl - Type: ACT_GATHER_INFO |
2004-11-10 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-576.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-103.nasl - Type: ACT_GATHER_INFO |
2004-09-29 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-377.nasl - Type: ACT_GATHER_INFO |
2004-07-31 | Name: The remote Mandrake Linux host is missing a security update. File: mandrake_MDKSA-2001-047.nasl - Type: ACT_GATHER_INFO |
2004-07-31 | Name: The remote Mandrake Linux host is missing one or more security updates. File: mandrake_MDKSA-2001-095.nasl - Type: ACT_GATHER_INFO |
1999-08-22 | Name: The remote web server contains a CGI application that has no access restricti... File: cachemgr_cgi.nasl - Type: ACT_GATHER_INFO |