Redhat » Enterprise Linux Workstation : Security Vulnerabilities Published In 2015
The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
| Max Base Score | 9.8 |
| Published | 2015-12-02 |
| Updated | 2023-02-16 |
| EPSS | 2.37% |
Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
| Max Base Score | 7.5 |
| Published | 2015-12-17 |
| Updated | 2018-10-30 |
| EPSS | 2.37% |
The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2017-09-14 |
| EPSS | 0.96% |
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
| Max Base Score | 5.8 |
| Published | 2015-12-15 |
| Updated | 2019-03-08 |
| EPSS | 0.65% |
The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
| Max Base Score | 6.4 |
| Published | 2015-12-15 |
| Updated | 2017-09-14 |
| EPSS | 1.14% |
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
| Max Base Score | 7.5 |
| Published | 2015-11-13 |
| Updated | 2022-05-13 |
| EPSS | 1.31% |
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
| Max Base Score | 5.0 |
| Published | 2015-11-24 |
| Updated | 2017-07-01 |
| EPSS | 1.20% |
The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-13 |
| EPSS | 0.97% |
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-13 |
| EPSS | 0.25% |
Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-12 |
| EPSS | 1.57% |
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-12 |
| EPSS | 1.57% |
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
| Max Base Score | 7.1 |
| Published | 2015-12-15 |
| Updated | 2019-03-08 |
| EPSS | 0.53% |
CVE-2015-5287
Public exploit exists
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
| Max Base Score | 6.9 |
| Published | 2015-12-07 |
| Updated | 2016-12-07 |
| EPSS | 0.09% |
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
| Max Base Score | 7.2 |
| Published | 2015-12-17 |
| Updated | 2023-02-12 |
| EPSS | 0.04% |
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.
| Max Base Score | 3.6 |
| Published | 2015-12-07 |
| Updated | 2023-02-13 |
| EPSS | 0.04% |
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
| Max Base Score | 4.3 |
| Published | 2015-10-09 |
| Updated | 2018-10-30 |
| EPSS | 0.42% |
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
| Max Base Score | 6.8 |
| Published | 2015-10-09 |
| Updated | 2018-10-30 |
| EPSS | 0.69% |
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
| Max Base Score | 9.3 |
| Published | 2015-08-12 |
| Updated | 2023-02-13 |
| EPSS | 0.34% |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
| Max Base Score | 7.2 |
| Published | 2015-08-31 |
| Updated | 2023-02-12 |
| EPSS | 0.06% |
CVE-2015-5123
Known Exploited Vulnerability
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
| Max Base Score | 10.0 |
| Published | 2015-07-14 |
| Updated | 2021-09-08 |
| EPSS | 28.38% |
| KEV Added | 2022-04-13 |
CVE-2015-5122
Public exploit exists
Known Exploited Vulnerability
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
| Max Base Score | 10.0 |
| Published | 2015-07-14 |
| Updated | 2023-05-08 |
| EPSS | 97.41% |
| KEV Added | 2022-04-13 |
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
| Max Base Score | 2.1 |
| Published | 2015-12-07 |
| Updated | 2019-06-19 |
| EPSS | 0.06% |
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
| Max Base Score | 3.5 |
| Published | 2015-10-22 |
| Updated | 2022-09-20 |
| EPSS | 0.18% |
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
| Max Base Score | 4.6 |
| Published | 2015-10-21 |
| Updated | 2022-08-05 |
| EPSS | 0.25% |
Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
| Max Base Score | 4.0 |
| Published | 2015-10-21 |
| Updated | 2022-09-08 |
| EPSS | 0.54% |