Redhat » Enterprise Linux Hpc Node : Security Vulnerabilities Published In 2015
Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
| Max Base Score | 7.5 |
| Published | 2015-12-17 |
| Updated | 2018-10-30 |
| EPSS | 2.37% |
The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2017-09-14 |
| EPSS | 0.96% |
The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
| Max Base Score | 5.8 |
| Published | 2015-12-15 |
| Updated | 2019-03-08 |
| EPSS | 0.65% |
The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
| Max Base Score | 6.4 |
| Published | 2015-12-15 |
| Updated | 2017-09-14 |
| EPSS | 1.14% |
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
| Max Base Score | 5.0 |
| Published | 2015-11-24 |
| Updated | 2017-07-01 |
| EPSS | 1.20% |
The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-13 |
| EPSS | 0.97% |
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-13 |
| EPSS | 0.25% |
Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-12 |
| EPSS | 1.57% |
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
| Max Base Score | 5.0 |
| Published | 2015-12-15 |
| Updated | 2023-02-12 |
| EPSS | 1.57% |
The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
| Max Base Score | 7.1 |
| Published | 2015-12-15 |
| Updated | 2019-03-08 |
| EPSS | 0.53% |
CVE-2015-5287
Public exploit exists
The abrt-hook-ccpp help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users with certain permissions to gain privileges via a symlink attack on a file with a predictable name, as demonstrated by /var/tmp/abrt/abrt-hax-coredump or /var/spool/abrt/abrt-hax-coredump.
| Max Base Score | 6.9 |
| Published | 2015-12-07 |
| Updated | 2016-12-07 |
| EPSS | 0.09% |
The get_contents function in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) before 2.20 might allow local users to cause a denial of service (heap corruption) or gain privileges via a long line in the NSS files database.
| Max Base Score | 7.2 |
| Published | 2015-12-17 |
| Updated | 2023-02-12 |
| EPSS | 0.04% |
The abrt-action-install-debuginfo-to-abrt-cache help program in Automatic Bug Reporting Tool (ABRT) before 2.7.1 allows local users to write to arbitrary files via a symlink attack on unpacked.cpio in a pre-created directory with a predictable name in /var/tmp.
| Max Base Score | 3.6 |
| Published | 2015-12-07 |
| Updated | 2023-02-13 |
| EPSS | 0.04% |
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
| Max Base Score | 4.3 |
| Published | 2015-10-09 |
| Updated | 2018-10-30 |
| EPSS | 0.42% |
IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
| Max Base Score | 6.8 |
| Published | 2015-10-09 |
| Updated | 2018-10-30 |
| EPSS | 0.69% |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
| Max Base Score | 7.2 |
| Published | 2015-08-31 |
| Updated | 2023-02-12 |
| EPSS | 0.06% |
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
| Max Base Score | 7.2 |
| Published | 2015-10-21 |
| Updated | 2022-07-01 |
| EPSS | 0.04% |
The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2018-01-05 |
| EPSS | 3.06% |
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2018-01-05 |
| EPSS | 9.87% |
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
| Max Base Score | 4.3 |
| Published | 2015-06-15 |
| Updated | 2022-05-17 |
| EPSS | 7.47% |
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 4.03% |
PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 2.14% |
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2019-12-27 |
| EPSS | 71.94% |
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 10.23% |
The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 74.00% |