Redhat

Enterprise Linux Server Eus

622 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.06%
  • Published 05.02.2019 21:29:00
  • Last modified 21.11.2024 03:56:04

An earlier fix for an Inter-process Communication (IPC) vulnerability, CVE-2011-3079, added authentication to communication between IPC endpoints and server parents during IPC process creation. This authentication is insufficient for channels created...

  • EPSS 2.44%
  • Published 05.02.2019 21:29:00
  • Last modified 21.11.2024 03:56:04

When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This b...

  • EPSS 0.26%
  • Published 04.02.2019 18:29:00
  • Last modified 21.11.2024 04:42:35

Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.

  • EPSS 0.14%
  • Published 28.01.2019 15:29:00
  • Last modified 21.11.2024 04:42:35

A memory leak was discovered in the backport of fixes for CVE-2018-16864 in Red Hat Enterprise Linux. Function dispatch_message_real() in journald-server.c does not free the memory allocated by set_iovec_field_free() to store the `_CMDLINE=` entry. A...

  • EPSS 58.05%
  • Published 16.01.2019 20:29:01
  • Last modified 21.11.2024 04:09:17

"deny-answer-aliases" is a little-used feature intended to help recursive server operators protect end users against DNS rebinding attacks, a potential method of circumventing the security model used by client browsers. However, a defect in this feat...

  • EPSS 35.73%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3...

  • EPSS 38.17%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use...

  • EPSS 34.71%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:54

Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which record...

  • EPSS 5.23%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server tha...

  • EPSS 23.88%
  • Published 16.01.2019 20:29:00
  • Last modified 21.11.2024 03:24:55

An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. A...