Slackware

Slackware Linux

54 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.

Exploit
  • EPSS 0.89%
  • Veröffentlicht 14.11.2000 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.

  • EPSS 0.26%
  • Veröffentlicht 22.05.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.

  • EPSS 0.23%
  • Veröffentlicht 01.12.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.

  • EPSS 6.03%
  • Veröffentlicht 16.08.1999 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service.

  • EPSS 0.17%
  • Veröffentlicht 21.03.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.

Exploit
  • EPSS 0.35%
  • Veröffentlicht 17.03.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.

  • EPSS 48.33%
  • Veröffentlicht 09.02.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.

  • EPSS 0.06%
  • Veröffentlicht 02.01.1999 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by othe...

  • EPSS 0.15%
  • Veröffentlicht 13.07.1998 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.