Ubuntu

Ubuntu Linux

65 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 8.9%
  • Veröffentlicht 07.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated s...

Exploit
  • EPSS 1.25%
  • Veröffentlicht 06.11.2006 17:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 18.07.2006 15:37:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which causes the password to be...

  • EPSS 0.06%
  • Veröffentlicht 06.07.2006 20:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 13.03.2006 12:18:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 09.01.2006 23:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.

Exploit
  • EPSS 9.33%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.

Exploit
  • EPSS 11.29%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and ...

Exploit
  • EPSS 7.36%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to int...

  • EPSS 0.07%
  • Veröffentlicht 03.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.