Redhat

Enterprise Linux Desktop

1928 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 18.38%
  • Veröffentlicht 14.08.2009 15:16:27
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using ...

Exploit
  • EPSS 20.93%
  • Veröffentlicht 10.07.2009 15:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).

  • EPSS 21.52%
  • Veröffentlicht 05.07.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which al...

Exploit
  • EPSS 2.18%
  • Veröffentlicht 12.06.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozilla Firefox 3 before 3.0.11 might allow remote attackers to execute arbitrary code via a page transition during Java applet loading,...

  • EPSS 23.59%
  • Veröffentlicht 09.04.2009 00:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code...

  • EPSS 0.06%
  • Veröffentlicht 06.03.2009 11:30:02
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass...

  • EPSS 0.56%
  • Veröffentlicht 27.11.2008 00:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which allows remote authenticated users to bypass intended access restrictions and send requests to OpenPegasus WBEM services.

  • EPSS 1.58%
  • Veröffentlicht 27.11.2008 00:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

tog-pegasus in OpenGroup Pegasus 2.7.0 on Red Hat Enterprise Linux (RHEL) 5, Fedora 9, and Fedora 10 does not log failed authentication attempts to the OpenPegasus CIM server, which makes it easier for remote attackers to avoid detection of password ...

  • EPSS 0.05%
  • Veröffentlicht 03.10.2008 15:07:10
  • Zuletzt bearbeitet 09.04.2025 00:30:58

pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME en...

  • EPSS 0.8%
  • Veröffentlicht 27.08.2008 20:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.