Redhat

Enterprise Linux Workstation

1845 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.77%
  • Published 17.09.2018 14:29:00
  • Last modified 21.11.2024 03:15:02

A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssass...

  • EPSS 0.25%
  • Published 17.09.2018 14:29:00
  • Last modified 21.11.2024 03:44:01

Apache SpamAssassin 3.4.2 fixes a local user code injection in the meta rule syntax.

  • EPSS 0.86%
  • Published 14.09.2018 19:29:00
  • Last modified 21.11.2024 03:49:29

A flaw was found in 389-ds-base before version 1.3.8.4-13. The process ns-slapd crashes in delete_passwdPolicy function when persistent search connections are terminated unexpectedly leading to remote denial of service.

  • EPSS 0.97%
  • Published 10.09.2018 16:29:00
  • Last modified 21.11.2024 03:53:22

An issue was discovered in Artifex Ghostscript before 9.25. Incorrect "restoration of privilege" checking when running out of stack during exception handling could be used by attackers able to supply crafted PostScript to execute code using the "pipe...

  • EPSS 3.82%
  • Published 06.09.2018 21:29:00
  • Last modified 21.11.2024 04:08:43

The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments...

Exploit
  • EPSS 1.48%
  • Published 06.09.2018 14:29:00
  • Last modified 21.11.2024 03:49:26

A vulnerability was discovered in 389-ds-base through versions 1.3.7.10, 1.3.8.8 and 1.4.0.16. The lock controlling the error log was not correctly used when re-opening the log file in log__error_emergency(). An attacker could send a flood of modific...

  • EPSS 0.35%
  • Published 05.09.2018 18:29:00
  • Last modified 21.11.2024 03:52:55

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect access checking in temp file handling to disclose contents of files on the system otherwise not readable.

  • EPSS 0.28%
  • Published 05.09.2018 18:29:00
  • Last modified 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files to the builtin PDF14 converter could use a use-after-free in copydevice handling to crash the interpreter or possibly have unspecified other impact.

  • EPSS 0.45%
  • Published 05.09.2018 18:29:00
  • Last modified 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use incorrect free logic in pagedevice replacement to crash the interpreter.

  • EPSS 0.43%
  • Published 05.09.2018 18:29:00
  • Last modified 21.11.2024 03:52:56

In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use insufficient interpreter stack-size checking during error handling to crash the interpreter.