This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Redhat First view 2002-12-11
Product Enterprise Linux Last view 2015-08-14
Version 2.1 Type Os
Update *  
Edition workstation  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:o:redhat:enterprise_linux

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
5 2015-08-14 CVE-2015-1819

The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.

8.5 2007-04-05 CVE-2007-1351

Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.

5 2005-12-31 CVE-2005-3626

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.

10 2005-12-31 CVE-2005-3625

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."

5 2005-12-31 CVE-2005-3624

The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.

2.6 2005-12-31 CVE-2005-1918

The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".

7.5 2005-06-13 CVE-2005-1760

sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges.

4.6 2005-05-04 CVE-2005-1194

Stack-based buffer overflow in the ieee_putascii function for nasm 0.98 and earlier allows attackers to execute arbitrary code via a crafted asm file, a different vulnerability than CVE-2004-1287.

5 2005-05-02 CVE-2005-1061

The secure script in LogWatch before 2.6-2 allows attackers to prevent LogWatch from detecting malicious activity via certain strings in the secure file that are later used as part of a regular expression, which causes the parser to crash, aka "logwatch log processing regular expression DoS."

3.7 2005-05-02 CVE-2005-0988

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.

4.6 2005-05-02 CVE-2005-0078

The KDE screen saver in KDE before 3.0.5 does not properly check the return value from a certain function call, which allows attackers with physical access to cause a crash and access the desktop session.

7.5 2005-04-27 CVE-2005-0206

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.

7.5 2005-04-14 CVE-2004-1176

Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.

7.5 2005-04-14 CVE-2004-1175

fish.c in midnight commander allows remote attackers to execute arbitrary programs via "insecure filename quoting," possibly using shell metacharacters.

5 2005-04-14 CVE-2004-1174

direntry.c in Midnight Commander (mc) 4.5.55 and earlier allows attackers to cause a denial of service by "manipulating non-existing file handles."

5 2005-04-14 CVE-2004-1093

Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via "use of already freed memory."

5 2005-04-14 CVE-2004-1092

Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by causing mc to free unallocated memory.

5 2005-04-14 CVE-2004-1091

Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service by triggering a null dereference.

5 2005-04-14 CVE-2004-1090

Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service via "a corrupt section header."

5 2005-04-14 CVE-2004-1009

Midnight commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.

7.5 2005-04-14 CVE-2004-1005

Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.

7.5 2005-04-14 CVE-2004-1004

Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.

5 2005-03-15 CVE-2005-0384

Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.

7.5 2005-03-08 CVE-2005-0699

Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.

5.1 2005-03-07 CVE-2005-0667

Buffer overflow in Sylpheed before 1.0.3 and other versions before 1.9.5 allows remote attackers to execute arbitrary code via an e-mail message with certain headers containing non-ASCII characters that are not properly handled when the user replies to the message.

CWE : Common Weakness Enumeration

%idName
50% (3) CWE-399 Resource Management Errors
33% (2) CWE-189 Numeric Errors
16% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-6 Argument Injection
CAPEC-15 Command Delimiters
CAPEC-79 Using Slashes in Alternate Encoding

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
73493 libpng pngerror.c png_format_buffer() Off-by-one PNG Image Handling Remote DoS
55381 GNU libc (glibc) getifaddrs Function Netlink Interface Spoofed Message Local DoS
44330 CUPS on Red Hat 64-bit pdftops Crafted PDF File Handling Overflow
34918 X.Org X11 libXfont bdfReadCharacters Function BDF Font Handling Overflow
34917 FreeType bdfReadCharacters Function BDF Font Handling Overflow
22235 Multiple Products Xpdf/kpdf Crafted FlateDecode Stream NULL Dereference DoS
22234 Multiple Products Xpdf/kpdf Crafted CCITTFaxDecode / DCTDecode Stream DoS
22233 Multiple Products Xpdf/kpdf Stream.cc CCITTFaxStream::CCITTFaxStream Function...
17302 Red Hat sysreport up2date Proxy Password Cleartext Disclosure
16894 Xpdf Integer Overflow Patch 64 Bit Architecture Failure
16440 Multiple Unix Vendor Hyper-Threading (HTT) Arbitrary Thread Process Informati...
16088 NASM ieee_putascii() Function ASM File Overflow
15708 Red Hat logwatch secure Log Parsing DoS
15487 gzip Race Condition Arbitrary File Permission Modification
15382 Mozilla Multiple Malformed HTML Tag Null Dereference DoS
14810 Linux Kernel Malformed PPP Packet Remote DoS
14612 Ethereal 3GPP2 A11 Dissector dissect_a11_radius() Function Overflow
14570 Sylpheed Message Header Processing Overflow
13897 Linux kernel VM_IO DoS
13204 KDE Screensaver Crash Local Bypass
13149 Xpdf Multiple Unspecified Remote Overflows
12911 Midnight Commander Unspecified Underflow DoS
12910 Midnight Commander Insecure Filename Quoting Arbitrary Command Execution
12909 Midnight Commander Nonexistent File Descriptor Handling DoS
12908 Midnight Commander Unspecified Freed Memory DoS

ExploitDB Exploits

id Description
24259 Ethereal 0.x Multiple Unspecified iSNS, SMB and SNMP Protocol Dissector Vulne...
718 Linux Kernel 2.6.x chown() Group Ownership Alteration Exploit

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-09-10 Name : Slackware Advisory SSA:2011-210-01 libpng
File : nvt/esoft_slk_ssa_2011_210_01.nasl
2012-07-09 Name : RedHat Update for libpng RHSA-2011:1105-01
File : nvt/gb_RHSA-2011_1105-01_libpng.nasl
2012-04-11 Name : Fedora Update for libpng10 FEDORA-2012-5079
File : nvt/gb_fedora_2012_5079_libpng10_fc15.nasl
2012-04-02 Name : Fedora Update for libpng10 FEDORA-2012-3536
File : nvt/gb_fedora_2012_3536_libpng10_fc15.nasl
2012-03-07 Name : Fedora Update for libpng10 FEDORA-2012-2008
File : nvt/gb_fedora_2012_2008_libpng10_fc15.nasl
2011-10-21 Name : Mandriva Update for libpng MDVSA-2011:151 (libpng)
File : nvt/gb_mandriva_MDVSA_2011_151.nasl
2011-08-02 Name : Fedora Update for libpng FEDORA-2011-9336
File : nvt/gb_fedora_2011_9336_libpng_fc14.nasl
2011-07-27 Name : Fedora Update for libpng10 FEDORA-2011-8844
File : nvt/gb_fedora_2011_8844_libpng10_fc15.nasl
2011-07-27 Name : Fedora Update for libpng10 FEDORA-2011-8867
File : nvt/gb_fedora_2011_8867_libpng10_fc14.nasl
2011-07-22 Name : Fedora Update for libpng FEDORA-2011-9343
File : nvt/gb_fedora_2011_9343_libpng_fc15.nasl
2011-07-18 Name : Fedora Update for mingw32-libpng FEDORA-2011-8868
File : nvt/gb_fedora_2011_8868_mingw32-libpng_fc14.nasl
2011-07-18 Name : Fedora Update for mingw32-libpng FEDORA-2011-8874
File : nvt/gb_fedora_2011_8874_mingw32-libpng_fc15.nasl
2010-05-12 Name : Mac OS X Security Update 2009-001
File : nvt/macosx_secupd_2009-001.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5010817.nasl
2009-10-10 Name : SLES9: Security update for ethereal
File : nvt/sles9p5010966.nasl
2009-10-10 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5011171.nasl
2009-10-10 Name : SLES9: Security update for Midnight Commander
File : nvt/sles9p5011441.nasl
2009-10-10 Name : SLES9: Security update for kdelibs3
File : nvt/sles9p5011912.nasl
2009-10-10 Name : SLES9: Security update for Mozilla
File : nvt/sles9p5012017.nasl
2009-10-10 Name : SLES9: Security update for freetype2
File : nvt/sles9p5013340.nasl
2009-10-10 Name : SLES9: Security update for gnome-vfs2,gnome-vfs2-doc
File : nvt/sles9p5014116.nasl
2009-10-10 Name : SLES9: Security update for imlib
File : nvt/sles9p5014360.nasl
2009-10-10 Name : SLES9: Security update for CUPS
File : nvt/sles9p5014529.nasl
2009-10-10 Name : SLES9: Security update for gnome-vfs
File : nvt/sles9p5014621.nasl

Snort® IPS/IDS

Date Description
2018-01-17 Mozilla Firefox buffer overflow attempt
RuleID : 45172 - Type : BROWSER-FIREFOX - Revision : 1
2018-01-17 Mozilla Firefox buffer overflow attempt
RuleID : 45171 - Type : BROWSER-FIREFOX - Revision : 1
2014-01-10 Microsoft Windows Bitmap width integer overflow multipacket attempt
RuleID : 3634 - Type : WEB-CLIENT - Revision : 9
2014-01-10 Microsoft Windows Bitmap width integer overflow attempt
RuleID : 3632 - Type : FILE-IMAGE - Revision : 25
2015-10-01 Microsoft Windows Bitmap width integer overflow attempt
RuleID : 35848 - Type : FILE-IMAGE - Revision : 3
2014-01-10 RADIUS ATTR_TYPE_STR overflow attempt
RuleID : 3541 - Type : SERVER-OTHER - Revision : 7
2014-01-10 RADIUS registration vendor ATTR_TYPE_STR overflow attempt
RuleID : 3540 - Type : SERVER-OTHER - Revision : 7
2014-01-10 RADIUS MSID overflow attempt
RuleID : 3539 - Type : SERVER-OTHER - Revision : 7
2014-01-10 RADIUS registration MSID overflow attempt
RuleID : 3538 - Type : SERVER-OTHER - Revision : 7
2014-01-10 Infinity CGI exploit scanner nph-exploitscanget.cgi access
RuleID : 2222-community - Type : SERVER-WEBAPP - Revision : 20
2014-01-10 Infinity CGI exploit scanner nph-exploitscanget.cgi access
RuleID : 2222 - Type : SERVER-WEBAPP - Revision : 20
2014-01-10 Metamail header length exploit attempt
RuleID : 22115 - Type : SERVER-MAIL - Revision : 6
2014-01-10 Metamail header length exploit attempt
RuleID : 22114 - Type : SERVER-MAIL - Revision : 6
2014-01-10 Metamail header length exploit attempt
RuleID : 22113 - Type : SERVER-MAIL - Revision : 6
2014-01-10 Metamail format string exploit attempt
RuleID : 22112 - Type : SERVER-MAIL - Revision : 5
2014-01-10 Metamail format string exploit attempt
RuleID : 22111 - Type : SERVER-MAIL - Revision : 5
2014-01-10 Metamail format string exploit attempt
RuleID : 22110 - Type : SERVER-MAIL - Revision : 4
2014-01-10 SMB client TRANS response ring0 remote code execution attempt
RuleID : 16531 - Type : NETBIOS - Revision : 11
2014-01-10 Samba unicode filename buffer overflow attempt
RuleID : 15986 - Type : SERVER-SAMBA - Revision : 8
2014-01-10 Samba wildcard filename matching denial of service attempt
RuleID : 15581 - Type : SERVER-SAMBA - Revision : 5

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-01-17 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201701-37.nasl - Type: ACT_GATHER_INFO
2016-04-01 Name: The remote device is affected by multiple vulnerabilities.
File: appletv_9_2.nasl - Type: ACT_GATHER_INFO
2016-03-22 Name: The remote Mac OS X host is affected by multiple vulnerabilities.
File: macosx_10_11_4.nasl - Type: ACT_GATHER_INFO
2016-03-22 Name: The remote host is missing a Mac OS X update that fixes multiple vulnerabilit...
File: macosx_SecUpd2016-002.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-037f844d3e.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-c24af963a2.nasl - Type: ACT_GATHER_INFO
2016-01-25 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2016-32.nasl - Type: ACT_GATHER_INFO
2016-01-12 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0030-1.nasl - Type: ACT_GATHER_INFO
2016-01-12 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2016-0049-1.nasl - Type: ACT_GATHER_INFO
2015-12-29 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3430.nasl - Type: ACT_GATHER_INFO
2015-12-29 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-959.nasl - Type: ACT_GATHER_INFO
2015-12-22 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20151207_libxml2_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2015-12-15 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2015-628.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-2550.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-2550.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-2550.nasl - Type: ACT_GATHER_INFO
2015-11-17 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2812-1.nasl - Type: ACT_GATHER_INFO
2015-08-04 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20150722_libxml2_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2015-07-31 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2015-0097.nasl - Type: ACT_GATHER_INFO
2015-07-30 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-1419.nasl - Type: ACT_GATHER_INFO
2015-07-28 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-1419.nasl - Type: ACT_GATHER_INFO
2015-07-23 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-1419.nasl - Type: ACT_GATHER_INFO
2015-07-08 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201507-08.nasl - Type: ACT_GATHER_INFO
2015-07-06 Name: The remote Debian host is missing a security update.
File: debian_DLA-266.nasl - Type: ACT_GATHER_INFO
2015-07-02 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_9c7177ff1fe111e59a01bcaec565249c.nasl - Type: ACT_GATHER_INFO