Redhat » Enterprise Linux Server Eus : Security Vulnerabilities Published In 2015
Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
| Max Base Score | 7.5 |
| Published | 2015-12-17 |
| Updated | 2018-10-30 |
| EPSS | 2.37% |
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
| Max Base Score | 5.0 |
| Published | 2015-11-24 |
| Updated | 2017-07-01 |
| EPSS | 1.20% |
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
| Max Base Score | 9.3 |
| Published | 2015-08-12 |
| Updated | 2023-02-13 |
| EPSS | 0.34% |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
| Max Base Score | 7.2 |
| Published | 2015-08-31 |
| Updated | 2023-02-12 |
| EPSS | 0.06% |
CVE-2015-5123
Known Exploited Vulnerability
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
| Max Base Score | 10.0 |
| Published | 2015-07-14 |
| Updated | 2021-09-08 |
| EPSS | 28.38% |
| KEV Added | 2022-04-13 |
CVE-2015-5122
Public exploit exists
Known Exploited Vulnerability
Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
| Max Base Score | 10.0 |
| Published | 2015-07-14 |
| Updated | 2023-05-08 |
| EPSS | 97.41% |
| KEV Added | 2022-04-13 |
IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
| Max Base Score | 2.1 |
| Published | 2015-12-07 |
| Updated | 2019-06-19 |
| EPSS | 0.06% |
Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
| Max Base Score | 7.2 |
| Published | 2015-10-21 |
| Updated | 2022-07-01 |
| EPSS | 0.04% |
The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2018-01-05 |
| EPSS | 3.06% |
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2018-01-05 |
| EPSS | 9.87% |
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 4.03% |
PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 2.14% |
Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2019-12-27 |
| EPSS | 71.94% |
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 10.23% |
The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
| Max Base Score | 5.0 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 74.00% |
The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
| Max Base Score | 6.8 |
| Published | 2015-06-09 |
| Updated | 2019-12-27 |
| EPSS | 5.27% |
Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-12-27 |
| EPSS | 61.31% |
The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (heap metadata corruption) or possibly have unspecified other impact via a crafted tar archive.
| Max Base Score | 7.5 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 8.22% |
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
| Max Base Score | 5.0 |
| Published | 2015-07-06 |
| Updated | 2023-02-13 |
| EPSS | 0.34% |
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
| Max Base Score | 6.9 |
| Published | 2015-08-31 |
| Updated | 2023-02-13 |
| EPSS | 0.09% |
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
| Max Base Score | 4.3 |
| Published | 2015-12-06 |
| Updated | 2022-12-13 |
| EPSS | 1.49% |
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
| Max Base Score | 7.5 |
| Published | 2015-03-30 |
| Updated | 2018-10-30 |
| EPSS | 8.36% |
ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
| Max Base Score | 5.8 |
| Published | 2015-06-09 |
| Updated | 2019-04-22 |
| EPSS | 3.90% |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
| Max Base Score | 4.0 |
| Published | 2015-07-16 |
| Updated | 2022-09-08 |
| EPSS | 0.24% |
The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
| Max Base Score | 5.0 |
| Published | 2015-03-30 |
| Updated | 2018-10-30 |
| EPSS | 0.77% |