CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Redhat » Linux » 7.1 : Security Vulnerabilities

Cpe Name:cpe:/o:redhat:linux:7.1
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2003-0464 2003-08-27 2008-09-10
4.6
None Local Low Not required Partial Partial Partial
The RPC code in Linux kernel 2.4 sets the reuse flag when sockets are created, which could allow local users to bind to UDP ports that are used by privileged services such as nfsd.
2 CVE-2003-0461 +Info 2003-08-27 2010-08-21
2.1
None Local Low Not required Partial None None
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
3 CVE-2003-0434 Exec Code 2003-07-24 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
4 CVE-2003-0370 2003-06-16 2008-09-10
7.5
None Remote Low Not required Partial Partial Partial
Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack.
5 CVE-2003-0364 DoS 2003-06-16 2008-09-10
5.0
None Remote Low Not required None None Partial
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
6 CVE-2003-0354 Exec Code 2003-06-16 2008-09-10
7.5
None Remote Low Not required Partial Partial Partial
Unknown vulnerability in GNU Ghostscript before 7.07 allows attackers to execute arbitrary commands, even when -dSAFER is enabled, via a PostScript file that causes the commands to be executed from a malicious print job.
7 CVE-2003-0248 2003-06-16 2008-09-10
10.0
None Remote Low Not required Complete Complete Complete
The mxcsr code in Linux kernel 2.4 allows attackers to modify CPU state registers via a malformed address.
8 CVE-2003-0247 DoS 2003-06-16 2008-09-10
5.0
None Remote Low Not required None None Partial
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service ("kernel oops").
9 CVE-2003-0194 2003-06-09 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
tcpdump does not properly drop privileges to the pcap user when starting up.
10 CVE-2003-0188 Exec Code 2003-06-09 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
11 CVE-2002-1232 DoS 2002-11-04 2008-09-05
5.0
None Remote Low Not required None None Partial
Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
12 CVE-2002-1160 +Priv 2003-02-19 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
13 CVE-2002-0836 Exec Code 2002-10-28 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
14 CVE-2002-0638 +Priv 2002-08-12 2008-09-10
6.2
Admin Local High Not required Complete Complete Complete
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh.
15 CVE-2002-0083 189 +Priv 2002-03-15 2008-11-20
10.0
Admin Remote Low Not required Complete Complete Complete
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
16 CVE-2002-0045 2002-01-31 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
17 CVE-2002-0044 2002-01-31 2008-09-10
3.6
None Local Low Not required Partial Partial None
GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
18 CVE-2001-1383 2001-09-26 2008-09-10
6.2
Admin Local High Not required Complete Complete Complete
initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files.
19 CVE-2001-1002 Exec Code +Priv 2001-08-31 2008-09-05
7.5
None Remote Low Not required Partial Partial Partial
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
20 CVE-2001-0977 DoS 2001-07-16 2008-09-05
5.0
None Remote Low Not required None None Partial
slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cause a denial of service (crash) via an invalid Basic Encoding Rules (BER) length field.
21 CVE-2001-0886 DoS Exec Code Overflow 2001-12-21 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
22 CVE-2001-0872 +Priv 2001-12-21 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
23 CVE-2001-0859 2001-12-06 2008-09-05
5.0
None Remote Low Not required None Partial None
2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.
24 CVE-2001-0787 2001-10-18 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
25 CVE-2001-0635 +Priv 2001-08-14 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.
Total number of vulnerabilities : 25   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.