This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 1999-06-30
Product Linux Last view 2001-12-21
Version 5.2 Type Os
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:redhat:linux

Activity : Overall

Related : CVE

  Date Alert Description
4.6 2001-12-21 CVE-2001-0886

Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.

2.1 2001-10-18 CVE-2001-0736

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

4.6 2001-09-20 CVE-2001-0641

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

7.5 2001-06-27 CVE-2001-0473

Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.

7.2 2001-05-28 CVE-2001-1028

Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.

7.2 2001-01-09 CVE-2000-1134

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

7.2 2000-12-19 CVE-2000-0934

Glint in Red Hat Linux 5.2 allows local users to overwrite arbitrary files and cause a denial of service via a symlink attack.

7.2 2000-11-14 CVE-2000-0867

Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.

10 2000-11-14 CVE-2000-0844

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.

7.2 2000-06-21 CVE-2000-0607

Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.

7.2 2000-06-21 CVE-2000-0606

Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.

7.2 2000-02-26 CVE-2000-0170

Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.

7.5 1999-12-20 CVE-1999-0997

wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.

4.6 1999-10-07 CVE-1999-1347

Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.

7.5 1999-10-07 CVE-1999-1346

PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file.

6.4 1999-08-19 CVE-1999-0740

Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.

7.5 1999-07-25 CVE-1999-0710

The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.

2.1 1999-06-30 CVE-1999-1348

Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service.

CWE : Common Weakness Enumeration

%idName
100% (1) CWE-264 Permissions, Privileges, and Access Controls

Open Source Vulnerability Database (OSVDB)

id Description
14794 Multiple Unix Vendor locale subsystem Multiple Function Format String
14158 Multiple Unix Shell << Redirect Symlink Arbitrary File Overwrite
13499 Red Hat Linux Xsession .xsession Restricted Account Bypass
13026 Red Hat Linux rlogin PAM Config File Malformed Ruleset
12029 Kanji on Console (KON) kon -StartupMessage Parameter Local Overflow
11765 pico Symlink Arbitrary File Overwrite
11526 Linux Console (KON) kon Overflow
11524 Kanji on Console (KON) fld Input File Overflow
6069 Linuxconf Improper PAM Shutdown DoS
5824 klogd Malformed Kernel Message Format String
5615 Mutt IMAP Handling Remote Format String
5478 man ultimate_source Function Local Overflow
2007 GNU libc (glibc) glob Function Remote Overflow
1821 man -S Option Local Overflow
1736 WU-FTPD FTP Conversion Malformed File Name Handling Arbitrary Command Execution
1566 Red Hat Glint /tmp Symbolic Link
1233 Linux man MANPAGER Variable Local Overflow
1051 Linux in.telnetd Malformed TERM Variable DoS
28 Squid cachemgr.cgi Proxied Port Scanning

OpenVAS Exploits

id Description
2009-10-10 Name : SLES9: Security update for squid
File : nvt/sles9p5015546.nasl
2009-06-03 Name : Solaris Update for csh/pfcsh 110898-15
File : nvt/gb_solaris_110898_15.nasl
2009-05-05 Name : HP-UX Update for Shells HPSBUX00275
File : nvt/gb_hp_ux_HPSBUX00275.nasl
2008-09-04 Name : FreeBSD Ports: squid
File : nvt/freebsd_squid13.nasl
2008-01-17 Name : Debian Security Advisory DSA 103-1 (glibc)
File : nvt/deb_103_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 377-1 (wu-ftpd)
File : nvt/deb_377_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 576-1 (squid)
File : nvt/deb_576_1.nasl
2005-11-03 Name : RedHat 6.0 cachemgr.cgi
File : nvt/cachemgr_cgi.nasl
2005-11-03 Name : wu-ftpd SITE EXEC vulnerability
File : nvt/wu_ftpd_site_exec.nasl
0000-00-00 Name : Slackware Advisory SSA:2003-259-03 WU-FTPD Security Advisory
File : nvt/esoft_slk_ssa_2003_259_03.nasl

Snort® IPS/IDS

Date Description
2014-01-10 tar parameters
RuleID : 362-community - Type : PROTOCOL-FTP - Revision : 20
2014-01-10 tar parameters
RuleID : 362 - Type : PROTOCOL-FTP - Revision : 20
2014-01-10 format string attempt
RuleID : 1530 - Type : FTP - Revision : 14
2014-01-10 wu-ftp bad file completion attempt
RuleID : 1378-community - Type : PROTOCOL-FTP - Revision : 24
2014-01-10 wu-ftp bad file completion attempt
RuleID : 1378 - Type : PROTOCOL-FTP - Revision : 24
2014-01-10 wu-ftp bad file completion attempt
RuleID : 1377-community - Type : PROTOCOL-FTP - Revision : 24
2014-01-10 wu-ftp bad file completion attempt
RuleID : 1377 - Type : PROTOCOL-FTP - Revision : 24
2014-01-10 cachemgr.cgi access
RuleID : 1206-community - Type : SERVER-WEBAPP - Revision : 18
2014-01-10 cachemgr.cgi access
RuleID : 1206 - Type : SERVER-WEBAPP - Revision : 18

Nessus® Vulnerability Scanner

id Description
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-050.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2000-075.nasl - Type: ACT_GATHER_INFO
2012-09-06 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-031.nasl - Type: ACT_GATHER_INFO
2006-07-03 Name: The remote CentOS host is missing a security update.
File: centos_RHSA-2005-415.nasl - Type: ACT_GATHER_INFO
2005-07-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_a395397cc7c811d99e1ec296ac722cb3.nasl - Type: ACT_GATHER_INFO
2005-06-16 Name: The remote Red Hat host is missing a security update.
File: redhat-RHSA-2005-415.nasl - Type: ACT_GATHER_INFO
2005-06-13 Name: The remote Red Hat host is missing a security update.
File: redhat-RHSA-2005-489.nasl - Type: ACT_GATHER_INFO
2005-05-19 Name: The remote Fedora Core host is missing a security update.
File: fedora_2005-373.nasl - Type: ACT_GATHER_INFO
2004-11-10 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-576.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-103.nasl - Type: ACT_GATHER_INFO
2004-09-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-377.nasl - Type: ACT_GATHER_INFO
2004-07-31 Name: The remote Mandrake Linux host is missing a security update.
File: mandrake_MDKSA-2001-047.nasl - Type: ACT_GATHER_INFO
2004-07-31 Name: The remote Mandrake Linux host is missing one or more security updates.
File: mandrake_MDKSA-2001-095.nasl - Type: ACT_GATHER_INFO
1999-08-22 Name: The remote web server contains a CGI application that has no access restricti...
File: cachemgr_cgi.nasl - Type: ACT_GATHER_INFO