Summary
Detail | |||
---|---|---|---|
Vendor | Canonical | First view | 2005-12-31 |
Product | Ubuntu Linux | Last view | 2016-12-16 |
Version | 5.10 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:canonical:ubuntu_linux |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2016-12-16 | CVE-2016-9950 | An issue was discovered in Apport before 2.20.4. There is a path traversal issue in the Apport crash file "Package" and "SourcePackage" fields. These fields are used to build a path to the package specific hook files in the /usr/share/apport/package-hooks/ directory. An attacker can exploit this path traversal to execute arbitrary Python files from the local system. |
7.8 | 2016-12-16 | CVE-2016-9949 | An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code. |
7.8 | 2016-11-27 | CVE-2015-1328 | The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace. |
9 | 2007-04-05 | CVE-2007-1216 | Double free vulnerability in the GSS-API library (lib/gssapi/krb5/k5unseal.c), as used by the Kerberos administration daemon (kadmind) in MIT krb5 before 1.6.1, when used with the authentication method provided by the RPCSEC_GSS RPC library, allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via a message with an "an invalid direction encoding". |
9 | 2007-04-05 | CVE-2007-0957 | Stack-based buffer overflow in the krb5_klog_syslog function in the kadm5 library, as used by the Kerberos administration daemon (kadmind) and Key Distribution Center (KDC), in MIT krb5 before 1.6.1 allows remote authenticated users to execute arbitrary code and modify the Kerberos key database via crafted arguments, possibly involving certain format string specifiers. |
10 | 2007-04-05 | CVE-2007-0956 | The telnet daemon (telnetd) in MIT krb5 before 1.6.1 allows remote attackers to bypass authentication and gain system access via a username beginning with a '-' character, a similar issue to CVE-2007-0882. |
6.8 | 2007-03-21 | CVE-2007-1562 | The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response. |
6.8 | 2007-02-26 | CVE-2007-0780 | browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI. |
5.4 | 2007-02-26 | CVE-2007-0778 | The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache. |
9.3 | 2007-02-26 | CVE-2007-0777 | The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption. |
6.8 | 2007-02-26 | CVE-2007-0009 | Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values. |
4.3 | 2007-02-20 | CVE-2007-0988 | The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument. |
5 | 2007-02-13 | CVE-2007-0908 | The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable. |
9.3 | 2006-12-19 | CVE-2006-6504 | Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption. |
6.8 | 2006-12-19 | CVE-2006-6503 | Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to bypass cross-site scripting (XSS) protection by changing the src attribute of an IMG element to a javascript: URI. |
6.8 | 2006-12-19 | CVE-2006-6501 | Unspecified vulnerability in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to gain privileges and install malicious code via the watch Javascript function. |
6.8 | 2006-12-19 | CVE-2006-6500 | Heap-based buffer overflow in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by setting the CSS cursor to certain images that cause an incorrect size calculation when converting to a Windows bitmap. |
4.3 | 2006-12-19 | CVE-2006-6499 | The js_dtoa function in Mozilla Firefox 2.x before 2.0.0.1, 1.5.x before 1.5.0.9, Thunderbird before 1.5.0.9, and SeaMonkey before 1.0.7 overwrites memory instead of exiting when the floating point precision is reduced, which allows remote attackers to cause a denial of service via any plugins that reduce the precision. |
9.3 | 2006-11-21 | CVE-2006-5868 | Multiple buffer overflows in Imagemagick 6.0 before 6.0.6.2, and 6.2 before 6.2.4.5, has unknown impact and user-assisted attack vectors via a crafted SGI image. |
2.1 | 2006-10-17 | CVE-2006-5173 | Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access. |
4.3 | 2006-09-28 | CVE-2006-4343 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. |
4.9 | 2006-08-21 | CVE-2006-4093 | Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the "HID0 attention enable on PPC970 at boot time." |
4.6 | 2006-07-05 | CVE-2006-2935 | The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow. |
5 | 2006-05-30 | CVE-2006-2661 | ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference. |
4.3 | 2006-04-14 | CVE-2006-1741 | Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection". |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
21% (5) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (2) | CWE-476 | NULL Pointer Dereference |
8% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
8% (2) | CWE-200 | Information Exposure |
8% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
8% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
8% (2) | CWE-20 | Improper Input Validation |
4% (1) | CWE-787 | Out-of-bounds Write |
4% (1) | CWE-415 | Double Free |
4% (1) | CWE-306 | Missing Authentication for Critical Function |
4% (1) | CWE-254 | Security Features |
4% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
4% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
SAINT Exploits
Description | Link |
---|---|
Ubuntu overlayfs privilege elevation | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
43498 | Mozilla Firefox FTP Protocol PASV Response Client Manipulation |
34106 | MIT Kerberos telnet Crafted Username Remote Authentication Bypass |
34105 | MIT Kerberos 5 kadmind GSS-API Library Remote Key Database Manipulation |
34104 | MIT Kerberos 5 KDC krb5_klog_syslog() Function Remote Overflow |
32766 | PHP wddx Extension Unspecified Information Disclosure |
32762 | PHP on 64-bit zend_hash_init Function Remote DoS |
32115 | Mozilla Multiple Products JavaScript Engine Memory Corruption |
32110 | Mozilla Multiple Products Cache Collision Information Disclosure |
32107 | Mozilla Multiple Products Blocked Popup XSS |
32106 | Mozilla Network Security Services SSLv2 Server Remote Overflow |
31465 | Linux kernel EFLAGS Restore Alignment Check DoS |
31346 | Mozilla Multiple Products CPU FPP Reduction js_dtoa() Memory Corruption |
31345 | Mozilla Multiple Products on Windows CSS Cursor Image Overflow |
31344 | Mozilla Multiple Products JavaScript watch() Function Privilege Escalation |
31342 | Mozilla Multiple Products img.src javascript: URI XSS |
31341 | Mozilla Multiple Products SVG Processing Remote Code Execution |
29482 | GNU Binutils config/tc-crx.c reset_vars Variable Overflow |
29263 | OpenSSL SSLv2 get_server_hello Function Remote DoS |
28034 | Linux Kernel Uncleared HID0[31] Bit DoS |
27960 | GNU Binutils Assembler as_bad() Function Local Overflow |
27951 | ImageMagick ReadSGIImage() Function SGI File Processing Overflow |
27540 | Linux Kernel cdrom.c dvd_read_bca Function USB Storage Device Overflow |
26033 | FreeType Font File Processing NULL Dereference DoS |
24680 | Mozilla Multiple Products XBL Control Print Preview Privilege Escalation |
24679 | Mozilla Multiple Products crypto.generateCRMFRequest Method Arbitrary Code Ex... |
ExploitDB Exploits
id | Description |
---|---|
28726 | OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability |
4773 | OpenSSL < 0.9.7l / 0.9.8d - SSLv2 Client Crash Exploit |
OpenVAS Exploits
id | Description |
---|---|
2012-06-21 | Name : PHP version smaller than 4.4.5 File : nvt/nopsec_php_4_4_5.nasl |
2012-06-21 | Name : PHP version smaller than 5.2.1 File : nvt/nopsec_php_5_2_1.nasl |
2010-04-23 | Name : PHP 5.2.0 and Prior Versions Multiple Vulnerabilities File : nvt/gb_php_22496.nasl |
2010-02-03 | Name : Solaris Update for Kernel 122300-48 File : nvt/gb_solaris_122300_48.nasl |
2010-02-03 | Name : Solaris Update for Kernel 122301-48 File : nvt/gb_solaris_122301_48.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : Solaris Update for pkg utilities 113713-28 File : nvt/gb_solaris_113713_28.nasl |
2009-10-13 | Name : Solaris Update for /usr/bin/ssh 114356-19 File : nvt/gb_solaris_114356_19.nasl |
2009-10-13 | Name : Solaris Update for /usr/bin/ssh 114357-18 File : nvt/gb_solaris_114357_18.nasl |
2009-10-13 | Name : Solaris Update for Mozilla 1.7 119115-35 File : nvt/gb_solaris_119115_35.nasl |
2009-10-13 | Name : Solaris Update for Mozilla 1.7_x86 119116-35 File : nvt/gb_solaris_119116_35.nasl |
2009-10-13 | Name : Solaris Update for Kernel 122300-44 File : nvt/gb_solaris_122300_44.nasl |
2009-10-13 | Name : Solaris Update for Kernel 122301-44 File : nvt/gb_solaris_122301_44.nasl |
2009-10-10 | Name : SLES9: Security update for PHP4 File : nvt/sles9p5009300.nasl |
2009-10-10 | Name : SLES9: Security update for Mozilla suite File : nvt/sles9p5012115.nasl |
2009-10-10 | Name : SLES9: Security update for Mozilla suite File : nvt/sles9p5016317.nasl |
2009-10-10 | Name : SLES9: Security update for PHP4 File : nvt/sles9p5017282.nasl |
2009-10-10 | Name : SLES9: Security update for OpenSSL File : nvt/sles9p5018586.nasl |
2009-10-10 | Name : SLES9: Security update for Mozilla suite File : nvt/sles9p5019559.nasl |
2009-10-10 | Name : SLES9: Security update for Linux kernel File : nvt/sles9p5019905.nasl |
2009-10-10 | Name : SLES9: Security update for Linux kernel File : nvt/sles9p5020521.nasl |
2009-09-23 | Name : Solaris Update for kpasswd, libgss.so.1 and libkadm5clnt.so.1 109223-11 File : nvt/gb_solaris_109223_11.nasl |
2009-09-23 | Name : Solaris Update for kpasswd, libgss.so.1 and libkadm5clnt.so.1 109224-11 File : nvt/gb_solaris_109224_11.nasl |
2009-09-23 | Name : Solaris Update for pkg utilities 114568-27 File : nvt/gb_solaris_114568_27.nasl |
2009-09-23 | Name : Solaris Update for Kernel 122301-42 File : nvt/gb_solaris_122301_42.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-A-0009 | Multiple Vulnerabilities in Oracle Fusion Middleware Severity: Category I - VMSKEY: V0043395 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44049 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44048 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44047 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox memory corruption attempt RuleID : 44046 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox invalid watchpoint memory corruption attempt RuleID : 44045 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla Firefox invalid watchpoint memory corruption attempt RuleID : 44044 - Type : BROWSER-FIREFOX - Revision : 2 |
2017-09-21 | Mozilla browsers JavaScript argument passing code execution attempt RuleID : 44043 - Type : BROWSER-FIREFOX - Revision : 1 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41041 - Type : OS-LINUX - Revision : 2 |
2017-01-19 | Ubuntu Apport CrashDB crash report code injection attempt RuleID : 41040 - Type : OS-LINUX - Revision : 2 |
2014-01-10 | Mozilla products frame comment objects manipulation memory corruption attempt RuleID : 18296 - Type : BROWSER-FIREFOX - Revision : 5 |
2014-01-10 | MIT Kerberos V% KAdminD klog_vsyslog server overflow attempt RuleID : 16207 - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | Mozilla browsers JavaScript argument passing code execution attempt RuleID : 16005 - Type : BROWSER-FIREFOX - Revision : 12 |
2014-01-10 | Mozilla products frame comment objects manipulation memory corruption attempt RuleID : 15999 - Type : BROWSER-FIREFOX - Revision : 9 |
2014-01-10 | Mozilla Network Security Services SSLv2 stack overflow attempt RuleID : 11672 - Type : BROWSER-OTHER - Revision : 8 |
2014-01-10 | kerberos login environment variable authentication bypass attempt RuleID : 10464 - Type : PROTOCOL-TELNET - Revision : 8 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-12-15 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-3157-1.nasl - Type: ACT_GATHER_INFO |
2015-09-18 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL8106.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2640-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2642-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2643-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2644-2.nasl - Type: ACT_GATHER_INFO |
2015-06-22 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2646-2.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2640-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2642-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2643-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2644-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2645-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2646-1.nasl - Type: ACT_GATHER_INFO |
2015-06-16 | Name: The remote Ubuntu host is missing one or more security-related patches. File: ubuntu_USN-2647-1.nasl - Type: ACT_GATHER_INFO |
2014-10-10 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL6734.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2006-0617.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2006-0661.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2006-0695.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2006-0710.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2006-0758.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2006-0759.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing a security update. File: oraclelinux_ELSA-2006-0760.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2007-0015.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2007-0076.nasl - Type: ACT_GATHER_INFO |
2013-07-12 | Name: The remote Oracle Linux host is missing one or more security updates. File: oraclelinux_ELSA-2007-0077-2.nasl - Type: ACT_GATHER_INFO |