Redhat

Linux

230 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.55%
  • Published 16.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.

  • EPSS 0.94%
  • Published 16.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Konqueror Embedded and KDE 2.2.2 and earlier does not validate the Common Name (CN) field for X.509 Certificates, which could allow remote attackers to spoof certificates via a man-in-the-middle attack.

  • EPSS 0.04%
  • Published 09.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.

  • EPSS 0.09%
  • Published 09.06.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

tcpdump does not properly drop privileges to the pcap user when starting up.

  • EPSS 0.53%
  • Published 11.04.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

vsftpd FTP daemon in Red Hat Linux 9 is not compiled against TCP wrappers (tcp_wrappers) but is installed as a standalone service, which inadvertently prevents vsftpd from restricting access as intended.

  • EPSS 0.08%
  • Published 03.03.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.

  • EPSS 0.07%
  • Published 19.02.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's cred...

  • EPSS 0.67%
  • Published 19.02.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.

  • EPSS 1.23%
  • Published 19.02.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.

Exploit
  • EPSS 0.25%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in efstools in Bonobo, when installed setuid, allows local users to execute arbitrary code via long command line arguments.