Engardelinux

Secure Linux

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 06.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some...

  • EPSS 41.87%
  • Published 15.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.

  • EPSS 2.66%
  • Published 15.03.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.

  • EPSS 14.92%
  • Published 31.01.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.

  • EPSS 0.17%
  • Published 18.10.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.

  • EPSS 0.05%
  • Published 18.10.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

Guardian Digital WebTool in EnGarde Secure Linux 1.0.1 allows restarted services to inherit some environmental variables, which could allow local users to gain root privileges.

  • EPSS 0.46%
  • Published 11.07.2001 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.