Redhat

Linux

230 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.94%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header.

  • EPSS 0.47%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

2.4.3-12 kernel in Red Hat Linux 7.1 Korean installation program sets the setting default umask for init to 000, which installs files with world-writeable permissions.

  • EPSS 0.04%
  • Veröffentlicht 04.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

apmscript in Apmd in Red Hat 7.2 "Enigma" allows local users to create or change the modification dates of arbitrary files via a symlink attack on the LOW_POWER temporary file, which could be used to cause a denial of service, e.g. by creating /etc/n...

  • EPSS 0.17%
  • Veröffentlicht 18.10.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

  • EPSS 0.12%
  • Veröffentlicht 18.10.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.

  • EPSS 0.05%
  • Veröffentlicht 26.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

initscript in setserial 2.17-4 and earlier uses predictable temporary file names, which could allow local users to conduct unauthorized operations on files.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

Exploit
  • EPSS 20.24%
  • Veröffentlicht 20.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.

Exploit
  • EPSS 68.12%
  • Veröffentlicht 12.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Apache on Red Hat Linux with with the UserDir directive enabled generates different error codes when a username exists and there is no public_html directory and when the username does not exist, which could allow remote attackers to determine valid u...

  • EPSS 4.75%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains mal...