Redhat » Enterprise Linux Server Eus » 7.3 : Security Vulnerabilities
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.
Max Base Score | 5.5 |
Published | 2018-05-24 |
Updated | 2020-08-24 |
EPSS | 0.04% |
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
Max Base Score | 7.8 |
Published | 2018-04-06 |
Updated | 2019-07-30 |
EPSS | 1.62% |
rsyslog librelp version 1.2.14 and earlier contains a Buffer Overflow vulnerability in the checking of x509 certificates from a peer that can result in Remote code execution. This attack appear to be exploitable a remote attacker that can connect to rsyslog and trigger a stack buffer overflow by sending a specially crafted x509 certificate.
Max Base Score | 9.8 |
Published | 2018-03-23 |
Updated | 2023-06-12 |
EPSS | 52.65% |
The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
Max Base Score | 7.8 |
Published | 2018-05-02 |
Updated | 2023-02-24 |
EPSS | 0.04% |
The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.
Max Base Score | 7.8 |
Published | 2018-09-06 |
Updated | 2022-12-28 |
EPSS | 1.16% |
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Max Base Score | 7.8 |
Published | 2018-08-06 |
Updated | 2020-09-18 |
EPSS | 95.07% |
If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Max Base Score | 5.3 |
Published | 2018-06-11 |
Updated | 2019-10-03 |
EPSS | 0.98% |
An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.6, Firefox ESR < 52.6, and Firefox < 58.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2020-08-24 |
EPSS | 0.69% |
A use-after-free vulnerability can occur during WebRTC connections when interacting with the DTMF timers. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Firefox < 58.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-09 |
EPSS | 0.88% |
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
Max Base Score | 8.0 |
Published | 2018-05-15 |
Updated | 2019-10-09 |
EPSS | 0.06% |
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
Max Base Score | 7.8 |
Published | 2017-06-19 |
Updated | 2020-10-15 |
EPSS | 0.06% |
The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
Max Base Score | 8.0 |
Published | 2017-09-12 |
Updated | 2023-01-19 |
EPSS | 0.90% |
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
Max Base Score | 5.5 |
Published | 2018-07-26 |
Updated | 2020-10-15 |
EPSS | 0.10% |
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
Max Base Score | 9.1 |
Published | 2017-07-13 |
Updated | 2021-06-06 |
EPSS | 88.88% |
CVE-2017-9462
Public exploit exists
In Mercurial before 4.1.3, "hg serve --stdio" allows remote authenticated users to launch the Python debugger, and consequently execute arbitrary code, by using --debugger as a repository name.
Max Base Score | 9.0 |
Published | 2017-06-06 |
Updated | 2020-02-05 |
EPSS | 2.64% |
Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
Max Base Score | 7.8 |
Published | 2017-07-25 |
Updated | 2021-08-04 |
EPSS | 0.07% |
RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
Max Base Score | 5.3 |
Published | 2018-06-11 |
Updated | 2018-08-09 |
EPSS | 2.25% |
A use-after-free vulnerability can occur when an editor DOM node is deleted prematurely during tree traversal while still bound to the document. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-03 |
EPSS | 0.80% |
A mechanism that uses AppCache to hijack a URL in a domain using fallback by serving the files from a sub-path on the domain. This has been addressed by requiring fallback files be inside the manifest directory. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 8.1 |
Published | 2018-06-11 |
Updated | 2019-10-03 |
EPSS | 0.58% |
A use-after-free vulnerability can occur when manipulating the DOM during the resize event of an image element. If these elements have been freed due to a lack of strong references, a potentially exploitable crash may occur when the freed elements are accessed. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-03 |
EPSS | 0.80% |
A use-after-free vulnerability can occur while re-computing layout for a "marquee" element during window resizing where the updated style object is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-03 |
EPSS | 0.91% |
A use-after-free vulnerability can occur in WebSockets when the object holding the connection is freed before the disconnection operation is finished. This results in an exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-03 |
EPSS | 0.91% |
The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR < 52.3 and Firefox < 55.
Max Base Score | 8.8 |
Published | 2018-06-11 |
Updated | 2018-08-09 |
EPSS | 0.76% |
A use-after-free vulnerability can occur in the Fetch API when the worker or the associated window are freed when still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-09 |
EPSS | 0.72% |
A buffer overflow will occur when viewing a certificate in the certificate manager if the certificate has an extremely long object identifier (OID). This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Max Base Score | 9.8 |
Published | 2018-06-11 |
Updated | 2018-08-03 |
EPSS | 1.47% |