Vulnerabilites related to ubuntu - ubuntu_linux
CVE-2004-1235 (GCVE-0-2004-1235)
Vulnerability from cvelistv5
Published
2005-01-20 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:46:12.034Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.securityfocus.com/advisories/7804", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2005:016", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20162", }, { name: "RHSA-2005:043", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-043.html", }, { name: "2005-0001", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2005/0001/", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "FEDORA-2005-014", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/advisories/7805", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "SUSE-SR:2005:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "12190", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12190", }, { name: "linux-uselib-gain-privileges(18800)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800", }, { name: "20050107 Linux kernel sys_uselib local root vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2", }, { name: "oval:org.mitre.oval:def:9567", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567", }, { name: "FEDORA-2005-013", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/advisories/7806", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-01-07T00:00:00", descriptions: [ { lang: "en", value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.securityfocus.com/advisories/7804", }, { tags: [ "x_refsource_MISC", ], url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2005:016", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20162", }, { name: "RHSA-2005:043", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-043.html", }, { name: "2005-0001", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2005/0001/", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "FEDORA-2005-014", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/advisories/7805", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "SUSE-SR:2005:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "12190", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12190", }, { name: "linux-uselib-gain-privileges(18800)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800", }, { name: "20050107 Linux kernel sys_uselib local root vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2", }, { name: "oval:org.mitre.oval:def:9567", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567", }, { name: "FEDORA-2005-013", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/advisories/7806", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1235", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "http://www.securityfocus.com/advisories/7804", refsource: "CONFIRM", url: "http://www.securityfocus.com/advisories/7804", }, { name: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", refsource: "MISC", url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2005:016", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", refsource: "SECUNIA", url: "http://secunia.com/advisories/20162", }, { name: "RHSA-2005:043", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-043.html", }, { name: "2005-0001", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2005/0001/", }, { name: "RHSA-2005:092", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "FEDORA-2005-014", refsource: "FEDORA", url: "http://www.securityfocus.com/advisories/7805", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "CLA-2005:930", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "SUSE-SR:2005:001", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "12190", refsource: "BID", url: "http://www.securityfocus.com/bid/12190", }, { name: "linux-uselib-gain-privileges(18800)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800", }, { name: "20050107 Linux kernel sys_uselib local root vulnerability", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2", }, { name: "oval:org.mitre.oval:def:9567", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567", }, { name: "FEDORA-2005-013", refsource: "FEDORA", url: "http://www.securityfocus.com/advisories/7806", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1235", datePublished: "2005-01-20T05:00:00", dateReserved: "2004-12-15T00:00:00", dateUpdated: "2024-08-08T00:46:12.034Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0106 (GCVE-0-2005-0106)
Vulnerability from cvelistv5
Published
2005-05-03 04:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/113-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/18639 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:023 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/13471 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:57:41.236Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-113-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/113-1/", }, { name: "18639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18639", }, { name: "MDKSA-2006:023", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023", }, { name: "13471", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/13471", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-05-03T00:00:00", descriptions: [ { lang: "en", value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-113-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/113-1/", }, { name: "18639", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18639", }, { name: "MDKSA-2006:023", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023", }, { name: "13471", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/13471", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0106", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-113-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/113-1/", }, { name: "18639", refsource: "SECUNIA", url: "http://secunia.com/advisories/18639", }, { name: "MDKSA-2006:023", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023", }, { name: "13471", refsource: "BID", url: "http://www.securityfocus.com/bid/13471", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0106", datePublished: "2005-05-03T04:00:00", dateReserved: "2005-01-18T00:00:00", dateUpdated: "2024-08-07T20:57:41.236Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2009-0365 (GCVE-0-2009-0365)
Vulnerability from cvelistv5
Published
2009-03-05 02:00
Modified
2024-08-07 04:31
Severity ?
EPSS score ?
Summary
nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T04:31:26.156Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1021910", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1021910", }, { name: "USN-727-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { name: "USN-727-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-727-2", }, { name: "networkmanager-dbus-info-disclosure(49062)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062", }, { name: "1021908", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1021908", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", }, { name: "33966", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/33966", }, { name: "1021911", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1021911", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", }, { name: "oval:org.mitre.oval:def:10828", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828", }, { name: "34067", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34067", }, { name: "RHSA-2009:0362", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { name: "DSA-1955", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2009/dsa-1955", }, { name: "SUSE-SR:2009:009", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { name: "SUSE-SA:2009:013", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { name: "RHSA-2009:0361", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { name: "34177", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34177", }, { name: "34473", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34473", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-03-03T00:00:00", descriptions: [ { lang: "en", value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1021910", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1021910", }, { name: "USN-727-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { name: "USN-727-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-727-2", }, { name: "networkmanager-dbus-info-disclosure(49062)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062", }, { name: "1021908", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1021908", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", }, { name: "33966", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/33966", }, { name: "1021911", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1021911", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", }, { name: "oval:org.mitre.oval:def:10828", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828", }, { name: "34067", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34067", }, { name: "RHSA-2009:0362", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { name: "DSA-1955", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2009/dsa-1955", }, { name: "SUSE-SR:2009:009", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { name: "SUSE-SA:2009:013", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { name: "RHSA-2009:0361", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { name: "34177", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34177", }, { name: "34473", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34473", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-0365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1021910", refsource: "SECTRACK", url: "http://securitytracker.com/id?1021910", }, { name: "USN-727-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-727-1", }, { name: "USN-727-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-727-2", }, { name: "networkmanager-dbus-info-disclosure(49062)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062", }, { name: "1021908", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1021908", }, { name: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", refsource: "CONFIRM", url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", }, { name: "33966", refsource: "BID", url: "http://www.securityfocus.com/bid/33966", }, { name: "1021911", refsource: "SECTRACK", url: "http://securitytracker.com/id?1021911", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", }, { name: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", refsource: "CONFIRM", url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", }, { name: "oval:org.mitre.oval:def:10828", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828", }, { name: "34067", refsource: "SECUNIA", url: "http://secunia.com/advisories/34067", }, { name: "RHSA-2009:0362", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { name: "DSA-1955", refsource: "DEBIAN", url: "http://www.debian.org/security/2009/dsa-1955", }, { name: "SUSE-SR:2009:009", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { name: "SUSE-SA:2009:013", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { name: "RHSA-2009:0361", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { name: "34177", refsource: "SECUNIA", url: "http://secunia.com/advisories/34177", }, { name: "34473", refsource: "SECUNIA", url: "http://secunia.com/advisories/34473", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-0365", datePublished: "2009-03-05T02:00:00", dateReserved: "2009-01-29T00:00:00", dateUpdated: "2024-08-07T04:31:26.156Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0957 (GCVE-0-2004-0957)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/17783 | vdb-entry, x_refsource_XF | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.redhat.com/support/errata/RHSA-2004-611.html | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2005/dsa-707 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:070 | vendor-advisory, x_refsource_MANDRAKE | |
https://www.ubuntu.com/usn/usn-32-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.redhat.com/support/errata/RHSA-2004-597.html | vendor-advisory, x_refsource_REDHAT | |
http://www.ciac.org/ciac/bulletins/p-018.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:48.222Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "mysql-underscore-gain-priv(17783)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783", }, { name: "CLA-2005:947", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947", }, { name: "RHSA-2004:611", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-611.html", }, { name: "DSA-707", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-707", }, { name: "MDKSA-2005:070", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070", }, { name: "USN-32-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-32-1/", }, { name: "RHSA-2004:597", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-597.html", }, { name: "P-018", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred", ], url: "http://www.ciac.org/ciac/bulletins/p-018.shtml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-20T00:00:00", descriptions: [ { lang: "en", value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "mysql-underscore-gain-priv(17783)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783", }, { name: "CLA-2005:947", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947", }, { name: "RHSA-2004:611", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-611.html", }, { name: "DSA-707", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-707", }, { name: "MDKSA-2005:070", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070", }, { name: "USN-32-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-32-1/", }, { name: "RHSA-2004:597", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-597.html", }, { name: "P-018", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", ], url: "http://www.ciac.org/ciac/bulletins/p-018.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0957", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "mysql-underscore-gain-priv(17783)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783", }, { name: "CLA-2005:947", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947", }, { name: "RHSA-2004:611", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-611.html", }, { name: "DSA-707", refsource: "DEBIAN", url: "http://www.debian.org/security/2005/dsa-707", }, { name: "MDKSA-2005:070", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070", }, { name: "USN-32-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-32-1/", }, { name: "RHSA-2004:597", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-597.html", }, { name: "P-018", refsource: "CIAC", url: "http://www.ciac.org/ciac/bulletins/p-018.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0957", datePublished: "2004-10-21T04:00:00", dateReserved: "2004-10-13T00:00:00", dateUpdated: "2024-08-08T00:31:48.222Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-5365 (GCVE-0-2007-5365)
Vulnerability from cvelistv5
Published
2007-10-11 10:00
Modified
2024-08-07 15:31
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T15:31:57.167Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "27338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27338", }, { name: "27350", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27350", }, { name: "ADV-2008-3088", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/3088", }, { name: "4601", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/4601", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", }, { name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata42.html#001_dhcpd", }, { name: "25984", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/25984", }, { name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded", }, { name: "openbsd-dhcp-bo(37045)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045", }, { name: "RHSA-2007:0970", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html", }, { name: "DSA-1388", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2007/dsa-1388", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", }, { name: "USN-531-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-531-1", }, { name: "oval:org.mitre.oval:def:5817", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817", }, { name: "USN-531-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-531-2", }, { name: "27160", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27160", }, { name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded", }, { name: "27273", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27273", }, { name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata40.html#016_dhcpd", }, { name: "243806", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1", }, { name: "32668", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/32668", }, { name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata41.html#010_dhcpd", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", }, { name: "1018794", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1018794", }, { name: "1021157", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1021157", }, { name: "32213", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/32213", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-10-10T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-15T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "27338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27338", }, { name: "27350", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27350", }, { name: "ADV-2008-3088", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/3088", }, { name: "4601", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/4601", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", }, { name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata42.html#001_dhcpd", }, { name: "25984", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/25984", }, { name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded", }, { name: "openbsd-dhcp-bo(37045)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045", }, { name: "RHSA-2007:0970", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html", }, { name: "DSA-1388", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2007/dsa-1388", }, { tags: [ "x_refsource_MISC", ], url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", }, { name: "USN-531-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-531-1", }, { name: "oval:org.mitre.oval:def:5817", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817", }, { name: "USN-531-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-531-2", }, { name: "27160", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27160", }, { name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded", }, { name: "27273", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27273", }, { name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata40.html#016_dhcpd", }, { name: "243806", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1", }, { name: "32668", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/32668", }, { name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata41.html#010_dhcpd", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", }, { name: "1018794", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1018794", }, { name: "1021157", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1021157", }, { name: "32213", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/32213", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-5365", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "27338", refsource: "SECUNIA", url: "http://secunia.com/advisories/27338", }, { name: "27350", refsource: "SECUNIA", url: "http://secunia.com/advisories/27350", }, { name: "ADV-2008-3088", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/3088", }, { name: "4601", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/4601", }, { name: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", refsource: "CONFIRM", url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", }, { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", refsource: "CONFIRM", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", }, { name: "[4.2] 20071008 001: SECURITY FIX: October 8, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata42.html#001_dhcpd", }, { name: "25984", refsource: "BID", url: "http://www.securityfocus.com/bid/25984", }, { name: "20071102 DoS Exploit for DHCPd bug (Bugtraq ID 25984 ; CVE-2007-5365)", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded", }, { name: "openbsd-dhcp-bo(37045)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045", }, { name: "RHSA-2007:0970", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html", }, { name: "DSA-1388", refsource: "DEBIAN", url: "http://www.debian.org/security/2007/dsa-1388", }, { name: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", refsource: "MISC", url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", }, { name: "USN-531-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-531-1", }, { name: "oval:org.mitre.oval:def:5817", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817", }, { name: "USN-531-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-531-2", }, { name: "27160", refsource: "SECUNIA", url: "http://secunia.com/advisories/27160", }, { name: "20071011 CORE-2007-0928: Stack-based buffer overflow vulnerability in OpenBSDâ??s DHCP server", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded", }, { name: "27273", refsource: "SECUNIA", url: "http://secunia.com/advisories/27273", }, { name: "[4.0] 20071008 016: SECURITY FIX: October 8, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata40.html#016_dhcpd", }, { name: "243806", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1", }, { name: "32668", refsource: "SECUNIA", url: "http://secunia.com/advisories/32668", }, { name: "[4.1] 20071008 010: SECURITY FIX: October 8, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata41.html#010_dhcpd", }, { name: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", refsource: "CONFIRM", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", }, { name: "1018794", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1018794", }, { name: "1021157", refsource: "SECTRACK", url: "http://securitytracker.com/id?1021157", }, { name: "32213", refsource: "BID", url: "http://www.securityfocus.com/bid/32213", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-5365", datePublished: "2007-10-11T10:00:00", dateReserved: "2007-10-10T00:00:00", dateUpdated: "2024-08-07T15:31:57.167Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-1351 (GCVE-0-2007-1351)
Vulnerability from cvelistv5
Published
2007-04-06 01:00
Modified
2024-08-07 12:50
Severity ?
EPSS score ?
Summary
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T12:50:35.134Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2007:0150", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html", }, { name: "24745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24745", }, { name: "24921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24921", }, { name: "oval:org.mitre.oval:def:1810", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", }, { name: "33937", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/33937", }, { name: "2007-0013", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2007/0013/", }, { name: "24771", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24771", }, { name: "GLSA-200705-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200705-02.xml", }, { name: "24889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24889", }, { name: "24770", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24770", }, { name: "25006", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25006", }, { name: "24756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24756", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", }, { name: "25495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25495", }, { name: "24996", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24996", }, { name: "23283", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23300", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "SSA:2007-109-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", }, { name: "SUSE-SR:2007:006", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html", }, { name: "MDKSA-2007:081", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", }, { name: "DSA-1454", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1454", }, { name: "24758", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24758", }, { name: "ADV-2007-1264", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1264", }, { name: "1017857", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1017857", }, { name: "24885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24885", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25096", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25096", }, { name: "25195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "24776", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24776", }, { name: "28333", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28333", }, { name: "24768", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24768", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "30161", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30161", }, { name: "GLSA-200805-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sourceforge.net/project/shownotes.php?release_id=498954", }, { name: "DSA-1294", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24765", }, { name: "25216", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25216", }, { name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "xorg-bdf-font-bo(33417)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", }, { name: "102886", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata40.html#011_xorg", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "23402", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23402", }, { name: "25004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25004", }, { name: "25305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25305", }, { name: "oval:org.mitre.oval:def:11266", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", }, { name: "RHSA-2007:0132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24772", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata39.html#021_xorg", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-04-03T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "RHSA-2007:0150", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html", }, { name: "24745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24745", }, { name: "24921", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24921", }, { name: "oval:org.mitre.oval:def:1810", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", }, { name: "33937", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/33937", }, { name: "2007-0013", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2007/0013/", }, { name: "24771", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24771", }, { name: "GLSA-200705-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200705-02.xml", }, { name: "24889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24889", }, { name: "24770", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24770", }, { name: "25006", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25006", }, { name: "24756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24756", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", }, { name: "25495", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25495", }, { name: "24996", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24996", }, { name: "23283", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23300", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "SSA:2007-109-01", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", }, { name: "SUSE-SR:2007:006", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html", }, { name: "MDKSA-2007:081", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", }, { name: "DSA-1454", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1454", }, { name: "24758", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24758", }, { name: "ADV-2007-1264", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1264", }, { name: "1017857", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1017857", }, { name: "24885", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24885", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25096", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25096", }, { name: "25195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "24776", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24776", }, { name: "28333", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28333", }, { name: "24768", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24768", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "30161", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30161", }, { name: "GLSA-200805-07", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sourceforge.net/project/shownotes.php?release_id=498954", }, { name: "DSA-1294", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24765", }, { name: "25216", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25216", }, { name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "xorg-bdf-font-bo(33417)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", }, { name: "102886", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata40.html#011_xorg", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "23402", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23402", }, { name: "25004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25004", }, { name: "25305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25305", }, { name: "oval:org.mitre.oval:def:11266", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", }, { name: "RHSA-2007:0132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24772", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata39.html#021_xorg", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2007-1351", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2007:0150", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html", }, { name: "24745", refsource: "SECUNIA", url: "http://secunia.com/advisories/24745", }, { name: "24921", refsource: "SECUNIA", url: "http://secunia.com/advisories/24921", }, { name: "oval:org.mitre.oval:def:1810", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", }, { name: "33937", refsource: "SECUNIA", url: "http://secunia.com/advisories/33937", }, { name: "2007-0013", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2007/0013/", }, { name: "24771", refsource: "SECUNIA", url: "http://secunia.com/advisories/24771", }, { name: "GLSA-200705-02", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200705-02.xml", }, { name: "24889", refsource: "SECUNIA", url: "http://secunia.com/advisories/24889", }, { name: "24770", refsource: "SECUNIA", url: "http://secunia.com/advisories/24770", }, { name: "25006", refsource: "SECUNIA", url: "http://secunia.com/advisories/25006", }, { name: "24756", refsource: "SECUNIA", url: "http://secunia.com/advisories/24756", }, { name: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", refsource: "CONFIRM", url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", }, { name: "25495", refsource: "SECUNIA", url: "http://secunia.com/advisories/25495", }, { name: "24996", refsource: "SECUNIA", url: "http://secunia.com/advisories/24996", }, { name: "23283", refsource: "BID", url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", refsource: "BID", url: "http://www.securityfocus.com/bid/23300", }, { name: "http://support.apple.com/kb/HT3438", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "SSA:2007-109-01", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", }, { name: "SUSE-SR:2007:006", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html", }, { name: "MDKSA-2007:081", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", }, { name: "DSA-1454", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1454", }, { name: "24758", refsource: "SECUNIA", url: "http://secunia.com/advisories/24758", }, { name: "ADV-2007-1264", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1264", }, { name: "1017857", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1017857", }, { name: "24885", refsource: "SECUNIA", url: "http://secunia.com/advisories/24885", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25096", refsource: "SECUNIA", url: "http://secunia.com/advisories/25096", }, { name: "25195", refsource: "SECUNIA", url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", refsource: "SECUNIA", url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", refsource: "APPLE", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "24776", refsource: "SECUNIA", url: "http://secunia.com/advisories/24776", }, { name: "28333", refsource: "SECUNIA", url: "http://secunia.com/advisories/28333", }, { name: "24768", refsource: "SECUNIA", url: "http://secunia.com/advisories/24768", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", refsource: "MLIST", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", refsource: "SECUNIA", url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "30161", refsource: "SECUNIA", url: "http://secunia.com/advisories/30161", }, { name: "GLSA-200805-07", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", }, { name: "http://sourceforge.net/project/shownotes.php?release_id=498954", refsource: "CONFIRM", url: "http://sourceforge.net/project/shownotes.php?release_id=498954", }, { name: "DSA-1294", refsource: "DEBIAN", url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", refsource: "SECUNIA", url: "http://secunia.com/advisories/24765", }, { name: "25216", refsource: "SECUNIA", url: "http://secunia.com/advisories/25216", }, { name: "20070403 Multiple Vendor X Server BDF Font Parsing Integer Overflow Vulnerability", refsource: "IDEFENSE", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "xorg-bdf-font-bo(33417)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", }, { name: "102886", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { name: "https://issues.rpath.com/browse/RPL-1213", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "23402", refsource: "BID", url: "http://www.securityfocus.com/bid/23402", }, { name: "25004", refsource: "SECUNIA", url: "http://secunia.com/advisories/25004", }, { name: "25305", refsource: "SECUNIA", url: "http://secunia.com/advisories/25305", }, { name: "oval:org.mitre.oval:def:11266", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", }, { name: "RHSA-2007:0132", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", refsource: "SECUNIA", url: "http://secunia.com/advisories/24772", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { name: "http://issues.foresightlinux.org/browse/FL-223", refsource: "CONFIRM", url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2007-1351", datePublished: "2007-04-06T01:00:00", dateReserved: "2007-03-08T00:00:00", dateUpdated: "2024-08-07T12:50:35.134Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-1463 (GCVE-0-2007-1463)
Vulnerability from cvelistv5
Published
2007-03-21 19:00
Modified
2024-08-07 12:59
Severity ?
EPSS score ?
Summary
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T12:59:08.098Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "inkscape-dialogs-format-string(33163)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163", }, { name: "24859", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24859", }, { name: "24615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24615", }, { name: "24597", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24597", }, { name: "24584", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24584", }, { name: "23138", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23138", }, { name: "GLSA-200704-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml", }, { name: "24661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24661", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-1170", }, { name: "ADV-2007-1059", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1059", }, { name: "SUSE-SR:2007:008", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html", }, { name: "USN-438-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-438-1", }, { name: "MDKSA-2007:069", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069", }, { name: "20070324 FLEA-2007-0002-1: inkscape", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded", }, { name: "25072", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25072", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", }, { name: "23070", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23070", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-03-20T00:00:00", descriptions: [ { lang: "en", value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", shortName: "canonical", }, references: [ { name: "inkscape-dialogs-format-string(33163)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163", }, { name: "24859", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24859", }, { name: "24615", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24615", }, { name: "24597", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24597", }, { name: "24584", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24584", }, { name: "23138", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23138", }, { name: "GLSA-200704-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml", }, { name: "24661", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24661", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-1170", }, { name: "ADV-2007-1059", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1059", }, { name: "SUSE-SR:2007:008", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html", }, { name: "USN-438-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-438-1", }, { name: "MDKSA-2007:069", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069", }, { name: "20070324 FLEA-2007-0002-1: inkscape", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded", }, { name: "25072", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25072", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", }, { name: "23070", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23070", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@ubuntu.com", ID: "CVE-2007-1463", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "inkscape-dialogs-format-string(33163)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163", }, { name: "24859", refsource: "SECUNIA", url: "http://secunia.com/advisories/24859", }, { name: "24615", refsource: "SECUNIA", url: "http://secunia.com/advisories/24615", }, { name: "24597", refsource: "SECUNIA", url: "http://secunia.com/advisories/24597", }, { name: "24584", refsource: "SECUNIA", url: "http://secunia.com/advisories/24584", }, { name: "23138", refsource: "BID", url: "http://www.securityfocus.com/bid/23138", }, { name: "GLSA-200704-10", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml", }, { name: "24661", refsource: "SECUNIA", url: "http://secunia.com/advisories/24661", }, { name: "https://issues.rpath.com/browse/RPL-1170", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-1170", }, { name: "ADV-2007-1059", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1059", }, { name: "SUSE-SR:2007:008", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html", }, { name: "USN-438-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-438-1", }, { name: "MDKSA-2007:069", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069", }, { name: "20070324 FLEA-2007-0002-1: inkscape", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded", }, { name: "25072", refsource: "SECUNIA", url: "http://secunia.com/advisories/25072", }, { name: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", refsource: "CONFIRM", url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", }, { name: "23070", refsource: "BID", url: "http://www.securityfocus.com/bid/23070", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", assignerShortName: "canonical", cveId: "CVE-2007-1463", datePublished: "2007-03-21T19:00:00", dateReserved: "2007-03-15T00:00:00", dateUpdated: "2024-08-07T12:59:08.098Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-3625 (GCVE-0-2005-3625)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T23:17:23.366Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18349", }, { name: "oval:org.mitre.oval:def:9575", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18373", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18428", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18335", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "xpdf-ccittfaxdecode-dctdecode-dos(24023)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18908", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18389", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18385", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-01-06T00:00:00", descriptions: [ { lang: "en", value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18349", }, { name: "oval:org.mitre.oval:def:9575", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18373", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18428", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18335", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "xpdf-ccittfaxdecode-dctdecode-dos(24023)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18908", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18389", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18385", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2005-3625", datePublished: "2006-01-06T22:00:00", dateReserved: "2005-11-16T00:00:00", dateUpdated: "2024-08-07T23:17:23.366Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1058 (GCVE-0-2004-1058)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.873Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "18684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18684", }, { name: "19038", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19038", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "linux-spawning-race-condition(17151)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", }, { name: "19369", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19369", }, { name: "21476", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21476", }, { name: "11937", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11937", }, { name: "DSA-1018", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1018", }, { name: "11052", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11052", }, { name: "GLSA-200408-24", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", }, { name: "19607", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19607", }, { name: "RHSA-2006:0190", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html", }, { name: "oval:org.mitre.oval:def:10427", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", }, { name: "SUSE-SA:2006:012", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/38-1/", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "20060402-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2006:0191", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-14T00:00:00", descriptions: [ { lang: "en", value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "18684", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18684", }, { name: "19038", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19038", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "linux-spawning-race-condition(17151)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", }, { name: "19369", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19369", }, { name: "21476", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21476", }, { name: "11937", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11937", }, { name: "DSA-1018", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1018", }, { name: "11052", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11052", }, { name: "GLSA-200408-24", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", }, { name: "19607", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19607", }, { name: "RHSA-2006:0190", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html", }, { name: "oval:org.mitre.oval:def:10427", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", }, { name: "SUSE-SA:2006:012", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/38-1/", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "20060402-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2006:0191", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1058", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "18684", refsource: "SECUNIA", url: "http://secunia.com/advisories/18684", }, { name: "19038", refsource: "SECUNIA", url: "http://secunia.com/advisories/19038", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "linux-spawning-race-condition(17151)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", }, { name: "19369", refsource: "SECUNIA", url: "http://secunia.com/advisories/19369", }, { name: "21476", refsource: "SECUNIA", url: "http://secunia.com/advisories/21476", }, { name: "11937", refsource: "BID", url: "http://www.securityfocus.com/bid/11937", }, { name: "DSA-1018", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1018", }, { name: "11052", refsource: "BID", url: "http://www.securityfocus.com/bid/11052", }, { name: "GLSA-200408-24", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", }, { name: "19607", refsource: "SECUNIA", url: "http://secunia.com/advisories/19607", }, { name: "RHSA-2006:0190", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html", }, { name: "oval:org.mitre.oval:def:10427", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", }, { name: "SUSE-SA:2006:012", refsource: "SUSE", url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", }, { name: "USN-38-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/38-1/", }, { name: "FLSA:152532", refsource: "FEDORA", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "20060402-01-U", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2005:293", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2006:0191", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1058", datePublished: "2004-12-22T05:00:00", dateReserved: "2004-11-23T00:00:00", dateUpdated: "2024-08-08T00:39:00.873Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0969 (GCVE-0-2004-0969)
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
▼ | URL | Tags |
---|---|---|
http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 | vdb-entry, x_refsource_XF | |
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/11287 | vdb-entry, x_refsource_BID | |
http://www.trustix.org/errata/2004/0050 | vendor-advisory, x_refsource_TRUSTIX | |
http://secunia.com/advisories/18764 | third-party-advisory, x_refsource_SECUNIA | |
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.628Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-200411-15", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml", }, { name: "script-temporary-file-overwrite(17583)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "MDKSA-2006:038", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038", }, { name: "11287", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11287", }, { name: "2004-0050", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2004/0050", }, { name: "18764", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18764", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-09-30T00:00:00", descriptions: [ { lang: "en", value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "GLSA-200411-15", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml", }, { name: "script-temporary-file-overwrite(17583)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "MDKSA-2006:038", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038", }, { name: "11287", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11287", }, { name: "2004-0050", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2004/0050", }, { name: "18764", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18764", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0969", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "GLSA-200411-15", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml", }, { name: "script-temporary-file-overwrite(17583)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "MDKSA-2006:038", refsource: "MANDRIVA", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038", }, { name: "11287", refsource: "BID", url: "http://www.securityfocus.com/bid/11287", }, { name: "2004-0050", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2004/0050", }, { name: "18764", refsource: "SECUNIA", url: "http://secunia.com/advisories/18764", }, { name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", refsource: "CONFIRM", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0969", datePublished: "2004-10-20T04:00:00", dateReserved: "2004-10-19T00:00:00", dateUpdated: "2024-08-08T00:38:59.628Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2009-2939 (GCVE-0-2009-2939)
Vulnerability from cvelistv5
Published
2009-09-21 19:00
Modified
2024-08-07 06:07
Severity ?
EPSS score ?
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2009/09/18/6 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2011/dsa-2233 | vendor-advisory, x_refsource_DEBIAN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T06:07:37.330Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2009/09/18/6", }, { name: "DSA-2233", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2011/dsa-2233", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-09-18T00:00:00", descriptions: [ { lang: "en", value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2011-08-23T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2009/09/18/6", }, { name: "DSA-2233", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2011/dsa-2233", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-2939", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20090918 Insecure pid directory permissions for postfix on Debian / Ubuntu", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2009/09/18/6", }, { name: "DSA-2233", refsource: "DEBIAN", url: "http://www.debian.org/security/2011/dsa-2233", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-2939", datePublished: "2009-09-21T19:00:00", dateReserved: "2009-08-23T00:00:00", dateUpdated: "2024-08-07T06:07:37.330Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-3626 (GCVE-0-2005-3626)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T23:17:23.446Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18349", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18373", }, { name: "oval:org.mitre.oval:def:9992", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-962", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18428", }, { name: "xpdf-flatedecode-dos(24026)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18335", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18908", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18389", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18385", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-01-06T00:00:00", descriptions: [ { lang: "en", value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18349", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18373", }, { name: "oval:org.mitre.oval:def:9992", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-962", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18428", }, { name: "xpdf-flatedecode-dos(24026)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18335", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18908", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18389", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18385", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2005-3626", datePublished: "2006-01-06T22:00:00", dateReserved: "2005-11-16T00:00:00", dateUpdated: "2024-08-07T23:17:23.446Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0080 (GCVE-0-2005-0080)
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=110549296126351&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839 | x_refsource_CONFIRM | |
http://qa.debian.org/bts-security.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:57:41.090Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20050110 [USN-59-1] mailman vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://qa.debian.org/bts-security.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-01-10T00:00:00", descriptions: [ { lang: "en", value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-10-17T13:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20050110 [USN-59-1] mailman vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", }, { tags: [ "x_refsource_MISC", ], url: "http://qa.debian.org/bts-security.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0080", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20050110 [USN-59-1] mailman vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2", }, { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", refsource: "CONFIRM", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", }, { name: "http://qa.debian.org/bts-security.html", refsource: "MISC", url: "http://qa.debian.org/bts-security.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0080", datePublished: "2005-01-19T05:00:00", dateReserved: "2005-01-14T00:00:00", dateUpdated: "2024-08-07T20:57:41.090Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0817 (GCVE-0-2004-0817)
Vulnerability from cvelistv5
Published
2004-09-17 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2004-465.html | vendor-advisory, x_refsource_REDHAT | |
http://www.debian.org/security/2004/dsa-548 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:089 | vendor-advisory, x_refsource_MANDRAKE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17182 | vdb-entry, x_refsource_XF | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1 | vendor-advisory, x_refsource_SUNALERT | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.securityfocus.com/bid/11084 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843 | vdb-entry, signature, x_refsource_OVAL | |
http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.476Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2004:465", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-465.html", }, { name: "DSA-548", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-548", }, { name: "MDKSA-2004:089", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089", }, { name: "imlib-bmp-bo(17182)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182", }, { name: "201611", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "11084", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11084", }, { name: "oval:org.mitre.oval:def:8843", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843", }, { name: "GLSA-200409-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-09-15T00:00:00", descriptions: [ { lang: "en", value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2004:465", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-465.html", }, { name: "DSA-548", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-548", }, { name: "MDKSA-2004:089", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089", }, { name: "imlib-bmp-bo(17182)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182", }, { name: "201611", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "11084", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11084", }, { name: "oval:org.mitre.oval:def:8843", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843", }, { name: "GLSA-200409-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0817", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2004:465", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-465.html", }, { name: "DSA-548", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-548", }, { name: "MDKSA-2004:089", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089", }, { name: "imlib-bmp-bo(17182)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182", }, { name: "201611", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "11084", refsource: "BID", url: "http://www.securityfocus.com/bid/11084", }, { name: "oval:org.mitre.oval:def:8843", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843", }, { name: "GLSA-200409-12", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0817", datePublished: "2004-09-17T04:00:00", dateReserved: "2004-08-25T00:00:00", dateUpdated: "2024-08-08T00:31:47.476Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0206 (GCVE-0-2005-0206)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:05
Severity ?
EPSS score ?
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:05:25.397Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:11107", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107", }, { name: "MDKSA-2005:041", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041", }, { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:034", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-034.html", }, { name: "MDKSA-2005:056", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056", }, { name: "MDKSA-2005:043", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043", }, { name: "RHSA-2005:213", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-213.html", }, { name: "MDKSA-2005:044", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044", }, { name: "RHSA-2005:053", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-053.html", }, { name: "xpdf-pdf-bo(17818)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "MDKSA-2005:052", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052", }, { name: "RHSA-2005:132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-132.html", }, { name: "MDKSA-2005:042", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042", }, { name: "RHSA-2005:057", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-057.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-02-15T00:00:00", descriptions: [ { lang: "en", value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:11107", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107", }, { name: "MDKSA-2005:041", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041", }, { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:034", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-034.html", }, { name: "MDKSA-2005:056", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056", }, { name: "MDKSA-2005:043", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043", }, { name: "RHSA-2005:213", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-213.html", }, { name: "MDKSA-2005:044", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044", }, { name: "RHSA-2005:053", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-053.html", }, { name: "xpdf-pdf-bo(17818)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "MDKSA-2005:052", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052", }, { name: "RHSA-2005:132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-132.html", }, { name: "MDKSA-2005:042", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042", }, { name: "RHSA-2005:057", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-057.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0206", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:11107", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107", }, { name: "MDKSA-2005:041", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041", }, { name: "11501", refsource: "BID", url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:034", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-034.html", }, { name: "MDKSA-2005:056", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056", }, { name: "MDKSA-2005:043", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043", }, { name: "RHSA-2005:213", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-213.html", }, { name: "MDKSA-2005:044", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044", }, { name: "RHSA-2005:053", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-053.html", }, { name: "xpdf-pdf-bo(17818)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "MDKSA-2005:052", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052", }, { name: "RHSA-2005:132", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-132.html", }, { name: "MDKSA-2005:042", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042", }, { name: "RHSA-2005:057", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-057.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0206", datePublished: "2005-02-15T05:00:00", dateReserved: "2005-02-01T00:00:00", dateUpdated: "2024-08-07T21:05:25.397Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0889 (GCVE-0-2004-0889)
Vulnerability from cvelistv5
Published
2004-10-26 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/11501 | vdb-entry, x_refsource_BID | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:113 | vendor-advisory, x_refsource_MANDRAKE | |
http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17819 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=109880927526773&w=2 | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:48.137Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "MDKSA-2004:113", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "GLSA-200410-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "xpdf-pdf-file-bo(17819)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", }, { name: "SUSE-SA:2004:039", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-21T00:00:00", descriptions: [ { lang: "en", value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "MDKSA-2004:113", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "GLSA-200410-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "xpdf-pdf-file-bo(17819)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", }, { name: "SUSE-SA:2004:039", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0889", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "11501", refsource: "BID", url: "http://www.securityfocus.com/bid/11501", }, { name: "MDKSA-2004:113", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "GLSA-200410-30", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "xpdf-pdf-file-bo(17819)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", }, { name: "SUSE-SA:2004:039", refsource: "SUSE", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0889", datePublished: "2004-10-26T04:00:00", dateReserved: "2004-09-22T00:00:00", dateUpdated: "2024-08-08T00:31:48.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1065 (GCVE-0-2004-1065)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2005-032.html | vendor-advisory, x_refsource_REDHAT | |
http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html | vendor-advisory, x_refsource_SUSE | |
http://www.php.net/release_4_3_10.php | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877 | vdb-entry, signature, x_refsource_OVAL | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:151 | vendor-advisory, x_refsource_MANDRAKE | |
https://bugzilla.fedora.us/show_bug.cgi?id=2344 | vendor-advisory, x_refsource_FEDORA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18517 | vdb-entry, x_refsource_XF | |
http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html | vendor-advisory, x_refsource_OPENPKG | |
http://www.securityfocus.com/advisories/9028 | vendor-advisory, x_refsource_HP | |
http://www.redhat.com/support/errata/RHSA-2004-687.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.815Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2005:032", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "SUSE-SA:2005:002", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/release_4_3_10.php", }, { name: "oval:org.mitre.oval:def:10877", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877", }, { name: "MDKSA-2004:151", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { name: "FLSA:2344", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "php-exifreaddata-bo(18517)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517", }, { name: "OpenPKG-SA-2004.053", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-16T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2005:032", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "SUSE-SA:2005:002", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/release_4_3_10.php", }, { name: "oval:org.mitre.oval:def:10877", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877", }, { name: "MDKSA-2004:151", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { name: "FLSA:2344", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "php-exifreaddata-bo(18517)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517", }, { name: "OpenPKG-SA-2004.053", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1065", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2005:032", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "SUSE-SA:2005:002", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { name: "http://www.php.net/release_4_3_10.php", refsource: "CONFIRM", url: "http://www.php.net/release_4_3_10.php", }, { name: "oval:org.mitre.oval:def:10877", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877", }, { name: "MDKSA-2004:151", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { name: "FLSA:2344", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "php-exifreaddata-bo(18517)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517", }, { name: "OpenPKG-SA-2004.053", refsource: "OPENPKG", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", refsource: "HP", url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1065", datePublished: "2004-12-22T05:00:00", dateReserved: "2004-11-23T00:00:00", dateUpdated: "2024-08-08T00:39:00.815Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1069 (GCVE-0-2004-1069)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.
References
▼ | URL | Tags |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110306397320336&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://marc.info/?l=linux-kernel&m=110045613004761 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18312 | vdb-entry, x_refsource_XF |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.704Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://marc.info/?l=linux-kernel&m=110045613004761", }, { name: "linux-sockdgramsendmsg-race-condition(18312)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-14T00:00:00", descriptions: [ { lang: "en", value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://marc.info/?l=linux-kernel&m=110045613004761", }, { name: "linux-sockdgramsendmsg-race-condition(18312)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1069", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "[linux-kernel] 20041114 [PATCH] linux 2.9.10-rc1: Fix oops in unix_dgram_sendmsg when using", refsource: "MLIST", url: "http://marc.info/?l=linux-kernel&m=110045613004761", }, { name: "linux-sockdgramsendmsg-race-condition(18312)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1069", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-29T00:00:00", dateUpdated: "2024-08-08T00:39:00.704Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1019 (GCVE-0-2004-1019)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.862Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2005:032", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "php-unserialize-code-execution(18514)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514", }, { name: "SUSE-SU-2015:0365", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", }, { name: "SUSE-SA:2005:002", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.php.net/release_4_3_10.php", }, { name: "openSUSE-SU-2015:0325", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", }, { name: "oval:org.mitre.oval:def:10511", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511", }, { name: "RHSA-2005:816", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-816.html", }, { name: "MDKSA-2004:151", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.hardened-php.net/advisories/012004.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "FLSA:2344", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "OpenPKG-SA-2004.053", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-15T00:00:00", descriptions: [ { lang: "en", value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2005:032", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "php-unserialize-code-execution(18514)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514", }, { name: "SUSE-SU-2015:0365", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", }, { name: "SUSE-SA:2005:002", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.php.net/release_4_3_10.php", }, { name: "openSUSE-SU-2015:0325", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", }, { name: "oval:org.mitre.oval:def:10511", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511", }, { name: "RHSA-2005:816", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-816.html", }, { name: "MDKSA-2004:151", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { tags: [ "x_refsource_MISC", ], url: "http://www.hardened-php.net/advisories/012004.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "FLSA:2344", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "OpenPKG-SA-2004.053", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1019", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2005:032", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { name: "php-unserialize-code-execution(18514)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514", }, { name: "SUSE-SU-2015:0365", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", }, { name: "SUSE-SA:2005:002", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { name: "http://www.php.net/release_4_3_10.php", refsource: "CONFIRM", url: "http://www.php.net/release_4_3_10.php", }, { name: "openSUSE-SU-2015:0325", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", }, { name: "oval:org.mitre.oval:def:10511", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511", }, { name: "RHSA-2005:816", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-816.html", }, { name: "MDKSA-2004:151", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { name: "http://www.hardened-php.net/advisories/012004.txt", refsource: "MISC", url: "http://www.hardened-php.net/advisories/012004.txt", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { name: "FLSA:2344", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { name: "OpenPKG-SA-2004.053", refsource: "OPENPKG", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { name: "HPSBMA01212", refsource: "HP", url: "http://www.securityfocus.com/advisories/9028", }, { name: "RHSA-2004:687", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { name: "20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1019", datePublished: "2004-12-22T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:39:00.862Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0814 (GCVE-0-2004-0814)
Vulnerability from cvelistv5
Published
2004-10-28 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
References
▼ | URL | Tags |
---|---|---|
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110306397320336&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://bugzilla.fedora.us/show_bug.cgi?id=2336 | vendor-advisory, x_refsource_FEDORA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17816 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/archive/1/379005 | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/11492 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/bid/11491 | vdb-entry, x_refsource_BID | |
http://www.redhat.com/support/errata/RHSA-2005-293.html | vendor-advisory, x_refsource_REDHAT | |
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672 | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728 | vdb-entry, signature, x_refsource_OVAL |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.833Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "linux-tiocsetd-race-condition(17816)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816", }, { name: "20041020 CAN-2004-0814: Linux terminal layer races", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/379005", }, { name: "11492", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11492", }, { name: "11491", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11491", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", }, { name: "oval:org.mitre.oval:def:10728", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-20T00:00:00", descriptions: [ { lang: "en", value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "linux-tiocsetd-race-condition(17816)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816", }, { name: "20041020 CAN-2004-0814: Linux terminal layer races", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/379005", }, { name: "11492", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11492", }, { name: "11491", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11491", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", }, { name: "oval:org.mitre.oval:def:10728", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0814", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", refsource: "CONFIRM", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "linux-tiocsetd-race-condition(17816)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816", }, { name: "20041020 CAN-2004-0814: Linux terminal layer races", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/379005", }, { name: "11492", refsource: "BID", url: "http://www.securityfocus.com/bid/11492", }, { name: "11491", refsource: "BID", url: "http://www.securityfocus.com/bid/11491", }, { name: "RHSA-2005:293", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", refsource: "CONFIRM", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", }, { name: "oval:org.mitre.oval:def:10728", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0814", datePublished: "2004-10-28T04:00:00", dateReserved: "2004-08-25T00:00:00", dateUpdated: "2024-08-08T00:31:47.833Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0754 (GCVE-0-2005-0754)
Vulnerability from cvelistv5
Published
2005-04-24 04:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.kde.org/info/security/advisory-20050420-1.txt | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=111419664411051&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/15060 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/13313 | vdb-entry, x_refsource_BID | |
ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:28:27.162Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kde.org/info/security/advisory-20050420-1.txt", }, { name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2", }, { name: "15060", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/15060", }, { name: "13313", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/13313", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-04-22T00:00:00", descriptions: [ { lang: "en", value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-10-17T13:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kde.org/info/security/advisory-20050420-1.txt", }, { name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2", }, { name: "15060", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/15060", }, { name: "13313", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/13313", }, { tags: [ "x_refsource_CONFIRM", ], url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2005-0754", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www.kde.org/info/security/advisory-20050420-1.txt", refsource: "CONFIRM", url: "http://www.kde.org/info/security/advisory-20050420-1.txt", }, { name: "20050422 [KDE Security Advisory]: Kommander untrusted code execution", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2", }, { name: "15060", refsource: "SECUNIA", url: "http://secunia.com/advisories/15060", }, { name: "13313", refsource: "BID", url: "http://www.securityfocus.com/bid/13313", }, { name: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", refsource: "CONFIRM", url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2005-0754", datePublished: "2005-04-24T04:00:00", dateReserved: "2005-03-17T00:00:00", dateUpdated: "2024-08-07T21:28:27.162Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-5649 (GCVE-0-2006-5649)
Vulnerability from cvelistv5
Published
2006-12-14 00:00
Modified
2025-04-03 15:29
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/linux/security/advisories/2006_79_kernel.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/23361 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/23384 | third-party-advisory, x_refsource_SECUNIA | |
http://www.us.debian.org/security/2006/dsa-1237 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/23474 | third-party-advisory, x_refsource_SECUNIA | |
http://www.us.debian.org/security/2006/dsa-1233 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/23370 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ubuntu.com/usn/usn-395-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/21523 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/23395 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T19:55:54.145Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SA:2006:079", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23361", }, { name: "23384", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23384", }, { name: "DSA-1237", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.us.debian.org/security/2006/dsa-1237", }, { name: "23474", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23474", }, { name: "DSA-1233", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.us.debian.org/security/2006/dsa-1233", }, { name: "23370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23370", }, { name: "USN-395-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, { name: "21523", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/21523", }, { name: "23395", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23395", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2006-5649", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-03T15:27:45.836399Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400 Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-04-03T15:29:02.401Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-12-13T00:00:00.000Z", descriptions: [ { lang: "en", value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2006-12-22T10:00:00.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "SUSE-SA:2006:079", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23361", }, { name: "23384", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23384", }, { name: "DSA-1237", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.us.debian.org/security/2006/dsa-1237", }, { name: "23474", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23474", }, { name: "DSA-1233", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.us.debian.org/security/2006/dsa-1233", }, { name: "23370", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23370", }, { name: "USN-395-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, { name: "21523", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/21523", }, { name: "23395", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23395", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-5649", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SA:2006:079", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", refsource: "SECUNIA", url: "http://secunia.com/advisories/23361", }, { name: "23384", refsource: "SECUNIA", url: "http://secunia.com/advisories/23384", }, { name: "DSA-1237", refsource: "DEBIAN", url: "http://www.us.debian.org/security/2006/dsa-1237", }, { name: "23474", refsource: "SECUNIA", url: "http://secunia.com/advisories/23474", }, { name: "DSA-1233", refsource: "DEBIAN", url: "http://www.us.debian.org/security/2006/dsa-1233", }, { name: "23370", refsource: "SECUNIA", url: "http://secunia.com/advisories/23370", }, { name: "USN-395-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-395-1", }, { name: "21523", refsource: "BID", url: "http://www.securityfocus.com/bid/21523", }, { name: "23395", refsource: "SECUNIA", url: "http://secunia.com/advisories/23395", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-5649", datePublished: "2006-12-14T00:00:00.000Z", dateReserved: "2006-11-01T00:00:00.000Z", dateUpdated: "2025-04-03T15:29:02.401Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0891 (GCVE-0-2004-0891)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/17787 | vdb-entry, x_refsource_XF | |
https://bugzilla.fedora.us/show_bug.cgi?id=2188 | vendor-advisory, x_refsource_FEDORA | |
http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml | vendor-advisory, x_refsource_GENTOO | |
http://gaim.sourceforge.net/security/?id=9 | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790 | vdb-entry, signature, x_refsource_OVAL | |
https://www.ubuntu.com/usn/usn-8-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17790 | vdb-entry, x_refsource_XF | |
http://www.redhat.com/support/errata/RHSA-2004-604.html | vendor-advisory, x_refsource_REDHAT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17786 | vdb-entry, x_refsource_XF |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.791Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "gaim-msn-slp-dos(17787)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787", }, { name: "FLSA:2188", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188", }, { name: "GLSA-200410-23", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://gaim.sourceforge.net/security/?id=9", }, { name: "oval:org.mitre.oval:def:11790", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790", }, { name: "USN-8-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-8-1/", }, { name: "gaim-file-transfer-dos(17790)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790", }, { name: "RHSA-2004:604", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-604.html", }, { name: "gaim-msn-slp-bo(17786)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-20T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "gaim-msn-slp-dos(17787)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787", }, { name: "FLSA:2188", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188", }, { name: "GLSA-200410-23", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://gaim.sourceforge.net/security/?id=9", }, { name: "oval:org.mitre.oval:def:11790", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790", }, { name: "USN-8-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-8-1/", }, { name: "gaim-file-transfer-dos(17790)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790", }, { name: "RHSA-2004:604", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-604.html", }, { name: "gaim-msn-slp-bo(17786)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0891", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "gaim-msn-slp-dos(17787)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787", }, { name: "FLSA:2188", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188", }, { name: "GLSA-200410-23", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml", }, { name: "http://gaim.sourceforge.net/security/?id=9", refsource: "CONFIRM", url: "http://gaim.sourceforge.net/security/?id=9", }, { name: "oval:org.mitre.oval:def:11790", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790", }, { name: "USN-8-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-8-1/", }, { name: "gaim-file-transfer-dos(17790)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790", }, { name: "RHSA-2004:604", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-604.html", }, { name: "gaim-msn-slp-bo(17786)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0891", datePublished: "2004-10-21T04:00:00", dateReserved: "2004-09-22T00:00:00", dateUpdated: "2024-08-08T00:31:47.791Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2008-2808 (GCVE-0-2008-2808)
Vulnerability from cvelistv5
Published
2008-07-07 23:00
Modified
2024-08-07 09:14
Severity ?
EPSS score ?
Summary
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T09:14:14.873Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SA:2008:034", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", }, { name: "RHSA-2008:0549", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html", }, { name: "DSA-1697", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2009/dsa-1697", }, { name: "31021", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31021", }, { name: "oval:org.mitre.oval:def:9668", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668", }, { name: "30898", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-2646", }, { name: "30949", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30949", }, { name: "SSA:2008-191-03", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152", }, { name: "ADV-2009-0977", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2009/0977", }, { name: "31069", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31069", }, { name: "31008", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31008", }, { name: "31377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31377", }, { name: "RHSA-2008:0616", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html", }, { name: "ADV-2008-1993", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/1993/references", }, { name: "31023", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31023", }, { name: "30038", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/30038", }, { name: "DSA-1607", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1607", }, { name: "GLSA-200808-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200808-03.xml", }, { name: "31005", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31005", }, { name: "33433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/33433", }, { name: "FEDORA-2008-6127", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html", }, { name: "1020419", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1020419", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", }, { name: "31183", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31183", }, { name: "30903", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30903", }, { name: "RHSA-2008:0547", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html", }, { name: "FEDORA-2008-6193", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html", }, { name: "256408", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", }, { name: "SSA:2008-191", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911", }, { name: "DSA-1615", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1615", }, { name: "31195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31195", }, { name: "31076", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/31076", }, { name: "USN-619-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-619-1", }, { name: "30911", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30911", }, { name: "RHSA-2008:0569", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html", }, { name: "30878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30878", }, { name: "20080708 rPSA-2008-0216-1 firefox", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", }, { name: "FEDORA-2008-6196", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html", }, { name: "34501", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34501", }, { name: "MDVSA-2008:136", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-07-01T00:00:00", descriptions: [ { lang: "en", value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-11T19:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "SUSE-SA:2008:034", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", }, { name: "RHSA-2008:0549", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html", }, { name: "DSA-1697", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2009/dsa-1697", }, { name: "31021", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31021", }, { name: "oval:org.mitre.oval:def:9668", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668", }, { name: "30898", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-2646", }, { name: "30949", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30949", }, { name: "SSA:2008-191-03", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152", }, { name: "ADV-2009-0977", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2009/0977", }, { name: "31069", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31069", }, { name: "31008", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31008", }, { name: "31377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31377", }, { name: "RHSA-2008:0616", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html", }, { name: "ADV-2008-1993", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/1993/references", }, { name: "31023", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31023", }, { name: "30038", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/30038", }, { name: "DSA-1607", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1607", }, { name: "GLSA-200808-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200808-03.xml", }, { name: "31005", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31005", }, { name: "33433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/33433", }, { name: "FEDORA-2008-6127", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html", }, { name: "1020419", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1020419", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", }, { name: "31183", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31183", }, { name: "30903", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30903", }, { name: "RHSA-2008:0547", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html", }, { name: "FEDORA-2008-6193", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html", }, { name: "256408", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", }, { name: "SSA:2008-191", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911", }, { name: "DSA-1615", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1615", }, { name: "31195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31195", }, { name: "31076", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/31076", }, { name: "USN-619-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-619-1", }, { name: "30911", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30911", }, { name: "RHSA-2008:0569", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html", }, { name: "30878", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30878", }, { name: "20080708 rPSA-2008-0216-1 firefox", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", }, { name: "FEDORA-2008-6196", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html", }, { name: "34501", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34501", }, { name: "MDVSA-2008:136", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2008-2808", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SA:2008:034", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", }, { name: "RHSA-2008:0549", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html", }, { name: "DSA-1697", refsource: "DEBIAN", url: "http://www.debian.org/security/2009/dsa-1697", }, { name: "31021", refsource: "SECUNIA", url: "http://secunia.com/advisories/31021", }, { name: "oval:org.mitre.oval:def:9668", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668", }, { name: "30898", refsource: "SECUNIA", url: "http://secunia.com/advisories/30898", }, { name: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", refsource: "CONFIRM", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", }, { name: "https://issues.rpath.com/browse/RPL-2646", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-2646", }, { name: "30949", refsource: "SECUNIA", url: "http://secunia.com/advisories/30949", }, { name: "SSA:2008-191-03", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152", }, { name: "ADV-2009-0977", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2009/0977", }, { name: "31069", refsource: "SECUNIA", url: "http://secunia.com/advisories/31069", }, { name: "31008", refsource: "SECUNIA", url: "http://secunia.com/advisories/31008", }, { name: "31377", refsource: "SECUNIA", url: "http://secunia.com/advisories/31377", }, { name: "RHSA-2008:0616", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html", }, { name: "ADV-2008-1993", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/1993/references", }, { name: "31023", refsource: "SECUNIA", url: "http://secunia.com/advisories/31023", }, { name: "30038", refsource: "BID", url: "http://www.securityfocus.com/bid/30038", }, { name: "DSA-1607", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1607", }, { name: "GLSA-200808-03", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200808-03.xml", }, { name: "31005", refsource: "SECUNIA", url: "http://secunia.com/advisories/31005", }, { name: "33433", refsource: "SECUNIA", url: "http://secunia.com/advisories/33433", }, { name: "FEDORA-2008-6127", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html", }, { name: "1020419", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1020419", }, { name: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", refsource: "CONFIRM", url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", }, { name: "31183", refsource: "SECUNIA", url: "http://secunia.com/advisories/31183", }, { name: "30903", refsource: "SECUNIA", url: "http://secunia.com/advisories/30903", }, { name: "RHSA-2008:0547", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html", }, { name: "FEDORA-2008-6193", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html", }, { name: "256408", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", }, { name: "SSA:2008-191", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911", }, { name: "DSA-1615", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1615", }, { name: "31195", refsource: "SECUNIA", url: "http://secunia.com/advisories/31195", }, { name: "31076", refsource: "SECUNIA", url: "http://secunia.com/advisories/31076", }, { name: "USN-619-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-619-1", }, { name: "30911", refsource: "SECUNIA", url: "http://secunia.com/advisories/30911", }, { name: "RHSA-2008:0569", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html", }, { name: "30878", refsource: "SECUNIA", url: "http://secunia.com/advisories/30878", }, { name: "20080708 rPSA-2008-0216-1 firefox", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded", }, { name: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", refsource: "CONFIRM", url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", }, { name: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", refsource: "CONFIRM", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", }, { name: "FEDORA-2008-6196", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html", }, { name: "34501", refsource: "SECUNIA", url: "http://secunia.com/advisories/34501", }, { name: "MDVSA-2008:136", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2008-2808", datePublished: "2008-07-07T23:00:00", dateReserved: "2008-06-20T00:00:00", dateUpdated: "2024-08-07T09:14:14.873Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2009-3232 (GCVE-0-2009-3232)
Vulnerability from cvelistv5
Published
2009-09-17 10:00
Modified
2024-08-07 06:22
Severity ?
EPSS score ?
Summary
pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an "empty selection" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.
References
▼ | URL | Tags |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927 | x_refsource_CONFIRM | |
https://launchpad.net/bugs/410171 | x_refsource_CONFIRM | |
http://secunia.com/advisories/36620 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2009/09/08/7 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/36306 | vdb-entry, x_refsource_BID | |
https://usn.ubuntu.com/828-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T06:22:23.335Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://launchpad.net/bugs/410171", }, { name: "36620", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/36620", }, { name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2009/09/08/7", }, { name: "36306", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/36306", }, { name: "USN-828-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/828-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-09-08T00:00:00", descriptions: [ { lang: "en", value: "pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an \"empty selection\" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://launchpad.net/bugs/410171", }, { name: "36620", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/36620", }, { name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2009/09/08/7", }, { name: "36306", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/36306", }, { name: "USN-828-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/828-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2009-3232", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "pam-auth-update for PAM, as used in Ubuntu 8.10 and 9.4, and Debian GNU/Linux, does not properly handle an \"empty selection\" for system authentication modules in certain rare configurations, which causes any attempt to be successful and allows remote attackers to bypass authentication.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927", refsource: "CONFIRM", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519927", }, { name: "https://launchpad.net/bugs/410171", refsource: "CONFIRM", url: "https://launchpad.net/bugs/410171", }, { name: "36620", refsource: "SECUNIA", url: "http://secunia.com/advisories/36620", }, { name: "[oss-security] 20090908 CVE request - Debian/Ubuntu PAM auth module selection", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2009/09/08/7", }, { name: "36306", refsource: "BID", url: "http://www.securityfocus.com/bid/36306", }, { name: "USN-828-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/828-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2009-3232", datePublished: "2009-09-17T10:00:00", dateReserved: "2009-09-16T00:00:00", dateUpdated: "2024-08-07T06:22:23.335Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-5159 (GCVE-0-2007-5159)
Vulnerability from cvelistv5
Published
2007-10-01 00:00
Modified
2024-09-16 18:24
Severity ?
EPSS score ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=298651 | x_refsource_CONFIRM | |
https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/26938 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T15:24:42.139Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FEDORA-2007-2295", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", }, { name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html", }, { name: "26938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26938", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2007-10-01T00:00:00Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FEDORA-2007-2295", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", }, { name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html", }, { name: "26938", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26938", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-5159", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FEDORA-2007-2295", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", }, { name: "[fedora-desktop-list] 20070918 Re: fuse (Was Re: early-gdm redux)", refsource: "MLIST", url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html", }, { name: "26938", refsource: "SECUNIA", url: "http://secunia.com/advisories/26938", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-5159", datePublished: "2007-10-01T00:00:00Z", dateReserved: "2007-09-30T00:00:00Z", dateUpdated: "2024-09-16T18:24:53.206Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0802 (GCVE-0-2004-0802)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
References
▼ | URL | Tags |
---|---|---|
http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup | x_refsource_MISC | |
http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html | x_refsource_CONFIRM | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1 | vendor-advisory, x_refsource_SUNALERT | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870 | vendor-advisory, x_refsource_CONECTIVA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17183 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/11084 | vdb-entry, x_refsource_BID | |
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089 | vendor-advisory, x_refsource_MANDRAKE | |
http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.483Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", }, { name: "201611", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "imlib2-bmp-bo(17183)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183", }, { name: "11084", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11084", }, { name: "MDKSA-2004:089", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089", }, { name: "GLSA-200409-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-09-08T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", }, { name: "201611", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "imlib2-bmp-bo(17183)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183", }, { name: "11084", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11084", }, { name: "MDKSA-2004:089", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089", }, { name: "GLSA-200409-12", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0802", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", refsource: "MISC", url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", }, { name: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", refsource: "CONFIRM", url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", }, { name: "201611", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { name: "CLA-2004:870", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { name: "imlib2-bmp-bo(17183)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183", }, { name: "11084", refsource: "BID", url: "http://www.securityfocus.com/bid/11084", }, { name: "MDKSA-2004:089", refsource: "MANDRAKE", url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089", }, { name: "GLSA-200409-12", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0802", datePublished: "2004-09-24T04:00:00", dateReserved: "2004-08-25T00:00:00", dateUpdated: "2024-08-08T00:31:47.483Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0883 (GCVE-0-2004-0883)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.956Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "11695", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10330", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330", }, { name: "linux-smbreceivetrans2-dos(18136)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20162", }, { name: "VU#726198", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/726198", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "linux-smbprocreadxdata-dos(18135)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "linux-smb-response-dos(18134)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "20041118 [USN-30-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2", }, { name: "13232", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13232/", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-17T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "11695", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10330", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330", }, { name: "linux-smbreceivetrans2-dos(18136)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136", }, { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20162", }, { name: "VU#726198", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/726198", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "linux-smbprocreadxdata-dos(18135)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "linux-smb-response-dos(18134)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "20041118 [USN-30-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2", }, { name: "13232", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13232/", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0883", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "11695", refsource: "BID", url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10330", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330", }, { name: "linux-smbreceivetrans2-dos(18136)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136", }, { name: "http://security.e-matters.de/advisories/142004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", refsource: "SECUNIA", url: "http://secunia.com/advisories/20162", }, { name: "VU#726198", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/726198", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "linux-smbprocreadxdata-dos(18135)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135", }, { name: "RHSA-2004:505", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "linux-smb-response-dos(18134)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "20041118 [USN-30-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2", }, { name: "13232", refsource: "SECUNIA", url: "http://secunia.com/advisories/13232/", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0883", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-09-22T00:00:00", dateUpdated: "2024-08-08T00:31:47.956Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0988 (GCVE-0-2005-0988)
Vulnerability from cvelistv5
Published
2005-04-06 04:00
Modified
2024-08-07 21:35
Severity ?
EPSS score ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:35:59.902Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "APPLE-SA-2006-08-01", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, { name: "22033", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22033", }, { name: "ADV-2006-3101", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/3101", }, { name: "21253", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21253", }, { name: "DSA-752", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-752", }, { name: "101816", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", }, { name: "RHSA-2005:357", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2005-357.html", }, { name: "19289", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/19289", }, { name: "TA06-214A", tags: [ "third-party-advisory", "x_refsource_CERT", "x_transferred", ], url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", }, { name: "12996", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12996", }, { name: "15487", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/15487", }, { name: "oval:org.mitre.oval:def:765", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", }, { name: "oval:org.mitre.oval:def:10242", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", }, { name: "oval:org.mitre.oval:def:1169", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", }, { name: "SCOSA-2005.58", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", }, { name: "18100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18100", }, { name: "SSA:2006-262", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", }, { name: "20050404 gzip TOCTOU file-permissions vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/394965", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-04-05T00:00:00", descriptions: [ { lang: "en", value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "APPLE-SA-2006-08-01", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, { name: "22033", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22033", }, { name: "ADV-2006-3101", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/3101", }, { name: "21253", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21253", }, { name: "DSA-752", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-752", }, { name: "101816", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", }, { name: "RHSA-2005:357", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2005-357.html", }, { name: "19289", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/19289", }, { name: "TA06-214A", tags: [ "third-party-advisory", "x_refsource_CERT", ], url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", }, { name: "12996", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12996", }, { name: "15487", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/15487", }, { name: "oval:org.mitre.oval:def:765", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", }, { name: "oval:org.mitre.oval:def:10242", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", }, { name: "oval:org.mitre.oval:def:1169", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", }, { name: "SCOSA-2005.58", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", }, { name: "18100", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18100", }, { name: "SSA:2006-262", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", }, { name: "20050404 gzip TOCTOU file-permissions vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/394965", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0988", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "APPLE-SA-2006-08-01", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, { name: "22033", refsource: "SECUNIA", url: "http://secunia.com/advisories/22033", }, { name: "ADV-2006-3101", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/3101", }, { name: "21253", refsource: "SECUNIA", url: "http://secunia.com/advisories/21253", }, { name: "DSA-752", refsource: "DEBIAN", url: "http://www.debian.org/security/2005/dsa-752", }, { name: "101816", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", }, { name: "RHSA-2005:357", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2005-357.html", }, { name: "19289", refsource: "BID", url: "http://www.securityfocus.com/bid/19289", }, { name: "TA06-214A", refsource: "CERT", url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", }, { name: "12996", refsource: "BID", url: "http://www.securityfocus.com/bid/12996", }, { name: "15487", refsource: "OSVDB", url: "http://www.osvdb.org/15487", }, { name: "oval:org.mitre.oval:def:765", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", }, { name: "oval:org.mitre.oval:def:10242", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", }, { name: "oval:org.mitre.oval:def:1169", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", }, { name: "SCOSA-2005.58", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", }, { name: "18100", refsource: "SECUNIA", url: "http://secunia.com/advisories/18100", }, { name: "SSA:2006-262", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", }, { name: "20050404 gzip TOCTOU file-permissions vulnerability", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/394965", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0988", datePublished: "2005-04-06T04:00:00", dateReserved: "2005-04-06T00:00:00", dateUpdated: "2024-08-07T21:35:59.902Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-3597 (GCVE-0-2006-3597)
Vulnerability from cvelistv5
Published
2006-07-14 20:00
Modified
2024-08-07 18:39
Severity ?
EPSS score ?
Summary
passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/usn-316-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.osvdb.org/27091 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/21022 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T18:39:52.553Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-316-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-316-1", }, { name: "27091", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/27091", }, { name: "21022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21022", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-07-12T00:00:00", descriptions: [ { lang: "en", value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2006-07-26T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-316-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-316-1", }, { name: "27091", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/27091", }, { name: "21022", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21022", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-3597", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-316-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-316-1", }, { name: "27091", refsource: "OSVDB", url: "http://www.osvdb.org/27091", }, { name: "21022", refsource: "SECUNIA", url: "http://secunia.com/advisories/21022", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-3597", datePublished: "2006-07-14T20:00:00", dateReserved: "2006-07-14T00:00:00", dateUpdated: "2024-08-07T18:39:52.553Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1011 (GCVE-0-2004-1011)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
References
▼ | URL | Tags |
---|---|---|
http://security.e-matters.de/advisories/152004.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18198 | vdb-entry, x_refsource_XF | |
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110123023521619&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/13274/ | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200411-34.xml | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.588Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/152004.html", }, { name: "cyrus-imap-username-bo(18198)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-22T00:00:00", descriptions: [ { lang: "en", value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/152004.html", }, { name: "cyrus-imap-username-bo(18198)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1011", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://security.e-matters.de/advisories/152004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/152004.html", }, { name: "cyrus-imap-username-bo(18198)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198", }, { name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", refsource: "CONFIRM", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", refsource: "MLIST", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", refsource: "SECUNIA", url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1011", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:39:00.588Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0077 (GCVE-0-2005-0077)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:57:41.090Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1013007", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1013007", }, { name: "FLSA-2006:178989", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded", }, { name: "MDKSA-2005:030", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030", }, { name: "dbi-library-file-overwrite(19068)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068", }, { name: "DSA-658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-658", }, { name: "14015", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/14015", }, { name: "oval:org.mitre.oval:def:10552", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552", }, { name: "12360", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12360", }, { name: "GLSA-200501-38", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", }, { name: "14050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/14050", }, { name: "RHSA-2005:072", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-072.html", }, { name: "20050125 [USN-70-1] Perl DBI module vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-01-25T00:00:00", descriptions: [ { lang: "en", value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1013007", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1013007", }, { name: "FLSA-2006:178989", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded", }, { name: "MDKSA-2005:030", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030", }, { name: "dbi-library-file-overwrite(19068)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068", }, { name: "DSA-658", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-658", }, { name: "14015", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/14015", }, { name: "oval:org.mitre.oval:def:10552", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552", }, { name: "12360", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12360", }, { name: "GLSA-200501-38", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", }, { name: "14050", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/14050", }, { name: "RHSA-2005:072", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-072.html", }, { name: "20050125 [USN-70-1] Perl DBI module vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0077", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1013007", refsource: "SECTRACK", url: "http://securitytracker.com/id?1013007", }, { name: "FLSA-2006:178989", refsource: "FEDORA", url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded", }, { name: "MDKSA-2005:030", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030", }, { name: "dbi-library-file-overwrite(19068)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068", }, { name: "DSA-658", refsource: "DEBIAN", url: "http://www.debian.org/security/2005/dsa-658", }, { name: "14015", refsource: "SECUNIA", url: "http://secunia.com/advisories/14015", }, { name: "oval:org.mitre.oval:def:10552", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552", }, { name: "12360", refsource: "BID", url: "http://www.securityfocus.com/bid/12360", }, { name: "GLSA-200501-38", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", }, { name: "14050", refsource: "SECUNIA", url: "http://secunia.com/advisories/14050", }, { name: "RHSA-2005:072", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-072.html", }, { name: "20050125 [USN-70-1] Perl DBI module vulnerability", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0077", datePublished: "2005-01-29T05:00:00", dateReserved: "2005-01-14T00:00:00", dateUpdated: "2024-08-07T20:57:41.090Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1015 (GCVE-0-2004-1015)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18274 | vdb-entry, x_refsource_XF | |
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 | vendor-advisory, x_refsource_MANDRAKE | |
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145 | mailing-list, x_refsource_MLIST | |
http://security.gentoo.org/glsa/glsa-200411-34.xml | vendor-advisory, x_refsource_GENTOO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.635Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cyrus-magic-plus-bo(18274)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-23T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "cyrus-magic-plus-bo(18274)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1015", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "cyrus-magic-plus-bo(18274)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274", }, { name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", refsource: "CONFIRM", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "[cyrus-announce] 20041123 Cyrus IMAPd 2.2.10 Released", refsource: "MLIST", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145", }, { name: "GLSA-200411-34", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1015", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:39:00.635Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-1183 (GCVE-0-2006-1183)
Vulnerability from cvelistv5
Published
2006-03-13 11:00
Modified
2024-08-07 17:03
Severity ?
EPSS score ?
Summary
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
References
▼ | URL | Tags |
---|---|---|
https://usn.ubuntu.com/262-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/17086 | vdb-entry, x_refsource_BID | |
http://www.osvdb.org/23868 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2006/0927 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25170 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1015761 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/19200 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T17:03:28.374Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-262-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/262-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", }, { name: "17086", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/17086", }, { name: "23868", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/23868", }, { name: "ADV-2006-0927", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0927", }, { name: "ubuntu-installer-password-disclosure(25170)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170", }, { name: "1015761", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1015761", }, { name: "19200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19200", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-03-12T00:00:00", descriptions: [ { lang: "en", value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-262-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/262-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", }, { name: "17086", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/17086", }, { name: "23868", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/23868", }, { name: "ADV-2006-0927", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0927", }, { name: "ubuntu-installer-password-disclosure(25170)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170", }, { name: "1015761", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1015761", }, { name: "19200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19200", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-1183", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-262-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/262-1/", }, { name: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", refsource: "CONFIRM", url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", }, { name: "17086", refsource: "BID", url: "http://www.securityfocus.com/bid/17086", }, { name: "23868", refsource: "OSVDB", url: "http://www.osvdb.org/23868", }, { name: "ADV-2006-0927", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/0927", }, { name: "ubuntu-installer-password-disclosure(25170)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170", }, { name: "1015761", refsource: "SECTRACK", url: "http://securitytracker.com/id?1015761", }, { name: "19200", refsource: "SECUNIA", url: "http://secunia.com/advisories/19200", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-1183", datePublished: "2006-03-13T11:00:00", dateReserved: "2006-03-13T00:00:00", dateUpdated: "2024-08-07T17:03:28.374Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-6235 (GCVE-0-2006-6235)
Vulnerability from cvelistv5
Published
2006-12-07 11:00
Modified
2024-08-07 20:19
Severity ?
EPSS score ?
Summary
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:19:35.196Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1017349", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1017349", }, { name: "23269", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23269", }, { name: "23303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23303", }, { name: "20061206 rPSA-2006-0227-1 gnupg", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded", }, { name: "23255", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23255", }, { name: "USN-393-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-393-1", }, { name: "23513", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23513", }, { name: "23284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23284", }, { name: "USN-393-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-393-2", }, { name: "23245", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23245", }, { name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html", }, { name: "VU#427009", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/427009", }, { name: "SUSE-SR:2006:028", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html", }, { name: "RHSA-2006:0754", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html", }, { name: "DSA-1231", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1231", }, { name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded", }, { name: "23335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23335", }, { name: "23299", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23299", }, { name: "21462", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/21462", }, { name: "2006-0070", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2006/0070", }, { name: "23329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23329", }, { name: "GLSA-200612-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200612-03.xml", }, { name: "23259", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23259", }, { name: "MDKSA-2006:228", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228", }, { name: "23290", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23290", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-835", }, { name: "SUSE-SA:2006:075", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", }, { name: "ADV-2006-4881", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/4881", }, { name: "oval:org.mitre.oval:def:11245", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245", }, { name: "23250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23250", }, { name: "20061201-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc", }, { name: "gnupg-openpgp-code-execution(30711)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711", }, { name: "OpenPKG-SA-2006.037", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html", }, { name: "24047", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24047", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-12-06T00:00:00", descriptions: [ { lang: "en", value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-17T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1017349", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1017349", }, { name: "23269", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23269", }, { name: "23303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23303", }, { name: "20061206 rPSA-2006-0227-1 gnupg", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded", }, { name: "23255", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23255", }, { name: "USN-393-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-393-1", }, { name: "23513", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23513", }, { name: "23284", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23284", }, { name: "USN-393-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-393-2", }, { name: "23245", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23245", }, { name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html", }, { name: "VU#427009", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/427009", }, { name: "SUSE-SR:2006:028", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html", }, { name: "RHSA-2006:0754", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html", }, { name: "DSA-1231", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1231", }, { name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded", }, { name: "23335", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23335", }, { name: "23299", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23299", }, { name: "21462", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/21462", }, { name: "2006-0070", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2006/0070", }, { name: "23329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23329", }, { name: "GLSA-200612-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200612-03.xml", }, { name: "23259", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23259", }, { name: "MDKSA-2006:228", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228", }, { name: "23290", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23290", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-835", }, { name: "SUSE-SA:2006:075", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", }, { name: "ADV-2006-4881", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/4881", }, { name: "oval:org.mitre.oval:def:11245", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245", }, { name: "23250", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23250", }, { name: "20061201-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc", }, { name: "gnupg-openpgp-code-execution(30711)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711", }, { name: "OpenPKG-SA-2006.037", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html", }, { name: "24047", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24047", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-6235", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1017349", refsource: "SECTRACK", url: "http://securitytracker.com/id?1017349", }, { name: "23269", refsource: "SECUNIA", url: "http://secunia.com/advisories/23269", }, { name: "23303", refsource: "SECUNIA", url: "http://secunia.com/advisories/23303", }, { name: "20061206 rPSA-2006-0227-1 gnupg", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded", }, { name: "23255", refsource: "SECUNIA", url: "http://secunia.com/advisories/23255", }, { name: "USN-393-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-393-1", }, { name: "23513", refsource: "SECUNIA", url: "http://secunia.com/advisories/23513", }, { name: "23284", refsource: "SECUNIA", url: "http://secunia.com/advisories/23284", }, { name: "USN-393-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-393-2", }, { name: "23245", refsource: "SECUNIA", url: "http://secunia.com/advisories/23245", }, { name: "[gnupg-announce] GnuPG: remotely controllable function pointer [CVE-2006-6235]", refsource: "MLIST", url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html", }, { name: "VU#427009", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/427009", }, { name: "SUSE-SR:2006:028", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html", }, { name: "RHSA-2006:0754", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html", }, { name: "DSA-1231", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1231", }, { name: "20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235]", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded", }, { name: "23335", refsource: "SECUNIA", url: "http://secunia.com/advisories/23335", }, { name: "23299", refsource: "SECUNIA", url: "http://secunia.com/advisories/23299", }, { name: "21462", refsource: "BID", url: "http://www.securityfocus.com/bid/21462", }, { name: "2006-0070", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2006/0070", }, { name: "23329", refsource: "SECUNIA", url: "http://secunia.com/advisories/23329", }, { name: "GLSA-200612-03", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200612-03.xml", }, { name: "23259", refsource: "SECUNIA", url: "http://secunia.com/advisories/23259", }, { name: "MDKSA-2006:228", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228", }, { name: "23290", refsource: "SECUNIA", url: "http://secunia.com/advisories/23290", }, { name: "https://issues.rpath.com/browse/RPL-835", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-835", }, { name: "SUSE-SA:2006:075", refsource: "SUSE", url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", }, { name: "ADV-2006-4881", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2006/4881", }, { name: "oval:org.mitre.oval:def:11245", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245", }, { name: "23250", refsource: "SECUNIA", url: "http://secunia.com/advisories/23250", }, { name: "20061201-01-P", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc", }, { name: "gnupg-openpgp-code-execution(30711)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711", }, { name: "OpenPKG-SA-2006.037", refsource: "OPENPKG", url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html", }, { name: "24047", refsource: "SECUNIA", url: "http://secunia.com/advisories/24047", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-6235", datePublished: "2006-12-07T11:00:00", dateReserved: "2006-12-02T00:00:00", dateUpdated: "2024-08-07T20:19:35.196Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1137 (GCVE-0-2004-1137)
Vulnerability from cvelistv5
Published
2004-12-15 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144 | vdb-entry, signature, x_refsource_OVAL | |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110306397320336&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://bugzilla.fedora.us/show_bug.cgi?id=2336 | vendor-advisory, x_refsource_FEDORA | |
http://www.novell.com/linux/security/advisories/2004_44_kernel.html | vendor-advisory, x_refsource_SUSE | |
http://www.redhat.com/support/errata/RHSA-2005-092.html | vendor-advisory, x_refsource_REDHAT | |
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 | vendor-advisory, x_refsource_CONECTIVA | |
http://isec.pl/vulnerabilities/isec-0018-igmp.txt | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18482 | vdb-entry, x_refsource_XF | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18481 | vdb-entry, x_refsource_XF |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.857Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:11144", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", }, { name: "linux-igmpmarksources-dos(18482)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482", }, { name: "linux-ipmcsource-code-execution(18481)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-14T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:11144", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { tags: [ "x_refsource_MISC", ], url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", }, { name: "linux-igmpmarksources-dos(18482)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482", }, { name: "linux-ipmcsource-code-execution(18481)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1137", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:11144", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "SUSE-SA:2004:044", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "RHSA-2005:092", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "CLA-2005:930", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", refsource: "MISC", url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", }, { name: "linux-igmpmarksources-dos(18482)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482", }, { name: "linux-ipmcsource-code-execution(18481)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1137", datePublished: "2004-12-15T05:00:00", dateReserved: "2004-12-06T00:00:00", dateUpdated: "2024-08-08T00:39:00.857Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0989 (GCVE-0-2004-0989)
Vulnerability from cvelistv5
Published
2004-10-28 04:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.682Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "APPLE-SA-2005-01-25", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html", }, { name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2", }, { name: "P-029", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred", ], url: "http://www.ciac.org/ciac/bulletins/p-029.shtml", }, { name: "11179", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/11179", }, { name: "1011941", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1011941", }, { name: "RHSA-2004:615", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-615.html", }, { name: "11526", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11526", }, { name: "oval:org.mitre.oval:def:10505", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505", }, { name: "libxml2-nanoftp-file-bo(17872)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872", }, { name: "RHSA-2004:650", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-650.html", }, { name: "GLSA-200411-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml", }, { name: "CLA-2004:890", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890", }, { name: "11324", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/11324", }, { name: "SUSE-SR:2005:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "oval:org.mitre.oval:def:1173", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173", }, { name: "USN-89-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-89-1/", }, { name: "13000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13000", }, { name: "DSA-582", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-582", }, { name: "libxml2-xmlnanoftpscanurl-bo(17870)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870", }, { name: "libxml2-xmlnanoftpscanproxy-bo(17875)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875", }, { name: "11180", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/11180", }, { name: "libxml2-nanohttp-file-bo(17876)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-26T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "APPLE-SA-2005-01-25", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html", }, { name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2", }, { name: "P-029", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", ], url: "http://www.ciac.org/ciac/bulletins/p-029.shtml", }, { name: "11179", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/11179", }, { name: "1011941", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1011941", }, { name: "RHSA-2004:615", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-615.html", }, { name: "11526", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11526", }, { name: "oval:org.mitre.oval:def:10505", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505", }, { name: "libxml2-nanoftp-file-bo(17872)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872", }, { name: "RHSA-2004:650", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-650.html", }, { name: "GLSA-200411-05", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml", }, { name: "CLA-2004:890", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890", }, { name: "11324", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/11324", }, { name: "SUSE-SR:2005:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "oval:org.mitre.oval:def:1173", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173", }, { name: "USN-89-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-89-1/", }, { name: "13000", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13000", }, { name: "DSA-582", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-582", }, { name: "libxml2-xmlnanoftpscanurl-bo(17870)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870", }, { name: "libxml2-xmlnanoftpscanproxy-bo(17875)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875", }, { name: "11180", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/11180", }, { name: "libxml2-nanohttp-file-bo(17876)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0989", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "APPLE-SA-2005-01-25", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html", }, { name: "20041026 libxml2 remote buffer overflows (not in xml parsing code though)", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2", }, { name: "P-029", refsource: "CIAC", url: "http://www.ciac.org/ciac/bulletins/p-029.shtml", }, { name: "11179", refsource: "OSVDB", url: "http://www.osvdb.org/11179", }, { name: "1011941", refsource: "SECTRACK", url: "http://securitytracker.com/id?1011941", }, { name: "RHSA-2004:615", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-615.html", }, { name: "11526", refsource: "BID", url: "http://www.securityfocus.com/bid/11526", }, { name: "oval:org.mitre.oval:def:10505", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505", }, { name: "libxml2-nanoftp-file-bo(17872)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872", }, { name: "RHSA-2004:650", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-650.html", }, { name: "GLSA-200411-05", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml", }, { name: "CLA-2004:890", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890", }, { name: "11324", refsource: "OSVDB", url: "http://www.osvdb.org/11324", }, { name: "SUSE-SR:2005:001", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { name: "oval:org.mitre.oval:def:1173", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173", }, { name: "USN-89-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-89-1/", }, { name: "13000", refsource: "SECUNIA", url: "http://secunia.com/advisories/13000", }, { name: "DSA-582", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-582", }, { name: "libxml2-xmlnanoftpscanurl-bo(17870)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870", }, { name: "libxml2-xmlnanoftpscanproxy-bo(17875)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875", }, { name: "11180", refsource: "OSVDB", url: "http://www.osvdb.org/11180", }, { name: "libxml2-nanohttp-file-bo(17876)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0989", datePublished: "2004-10-28T04:00:00", dateReserved: "2004-10-27T00:00:00", dateUpdated: "2024-08-08T00:38:59.682Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2008-5103 (GCVE-0-2008-5103)
Vulnerability from cvelistv5
Published
2008-11-17 18:00
Modified
2024-08-07 10:40
Severity ?
EPSS score ?
Summary
The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32697 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/32292 | vdb-entry, x_refsource_BID | |
http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/usn-670-1 | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46603 | vdb-entry, x_refsource_XF | |
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841 | x_refsource_CONFIRM | |
http://osvdb.org/49996 | vdb-entry, x_refsource_OSVDB |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T10:40:17.156Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "32697", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/32697", }, { name: "32292", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/32292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-password-weak-security(46603)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { name: "49996", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/49996", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-11-13T00:00:00", descriptions: [ { lang: "en", value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-07T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "32697", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/32697", }, { name: "32292", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/32292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-password-weak-security(46603)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { name: "49996", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/49996", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-5103", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "32697", refsource: "SECUNIA", url: "http://secunia.com/advisories/32697", }, { name: "32292", refsource: "BID", url: "http://www.securityfocus.com/bid/32292", }, { name: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", refsource: "CONFIRM", url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-password-weak-security(46603)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603", }, { name: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", refsource: "CONFIRM", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { name: "49996", refsource: "OSVDB", url: "http://osvdb.org/49996", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-5103", datePublished: "2008-11-17T18:00:00", dateReserved: "2008-11-17T00:00:00", dateUpdated: "2024-08-07T10:40:17.156Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-5877 (GCVE-0-2006-5877)
Vulnerability from cvelistv5
Published
2007-02-23 21:00
Modified
2024-08-07 20:04
Severity ?
EPSS score ?
Summary
The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.
References
▼ | URL | Tags |
---|---|---|
http://bugzilla.mozdev.org/show_bug.cgi?id=9730 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/22684 | vdb-entry, x_refsource_BID | |
http://enigmail.mozdev.org/changelog.html#enig0.94.2 | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/usn-427-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:04:55.595Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", }, { name: "22684", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/22684", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", }, { name: "USN-427-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-427-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-03-31T00:00:00", descriptions: [ { lang: "en", value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2008-11-15T10:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", }, { name: "22684", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/22684", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", }, { name: "USN-427-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-427-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-5877", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", refsource: "CONFIRM", url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", }, { name: "22684", refsource: "BID", url: "http://www.securityfocus.com/bid/22684", }, { name: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", refsource: "CONFIRM", url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", }, { name: "USN-427-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-427-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-5877", datePublished: "2007-02-23T21:00:00", dateReserved: "2006-11-14T00:00:00", dateUpdated: "2024-08-07T20:04:55.595Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1012 (GCVE-0-2004-1012)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2004/dsa-597 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18199 | vdb-entry, x_refsource_XF | |
http://security.e-matters.de/advisories/152004.html | x_refsource_MISC | |
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110123023521619&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/13274/ | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200411-34.xml | vendor-advisory, x_refsource_GENTOO | |
https://www.ubuntu.com/usn/usn-31-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.882Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-597", }, { name: "cyrus-imap-commands-execute-code(18199)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/152004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-22T00:00:00", descriptions: [ { lang: "en", value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-597", }, { name: "cyrus-imap-commands-execute-code(18199)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199", }, { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/152004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1012", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-597", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-597", }, { name: "cyrus-imap-commands-execute-code(18199)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199", }, { name: "http://security.e-matters.de/advisories/152004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/152004.html", }, { name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", refsource: "CONFIRM", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", refsource: "MLIST", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", refsource: "SECUNIA", url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1012", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:39:00.882Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1056 (GCVE-0-2004-1056)
Vulnerability from cvelistv5
Published
2004-12-22 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.fedora.us/show_bug.cgi?id=2336 | vendor-advisory, x_refsource_FEDORA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795 | vdb-entry, signature, x_refsource_OVAL | |
https://www.ubuntu.com/usn/usn-38-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15972 | vdb-entry, x_refsource_XF | |
http://www.redhat.com/support/errata/RHSA-2005-092.html | vendor-advisory, x_refsource_REDHAT | |
http://www.redhat.com/support/errata/RHSA-2005-551.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/17002 | third-party-advisory, x_refsource_SECUNIA | |
http://www.redhat.com/support/errata/RHSA-2005-529.html | vendor-advisory, x_refsource_REDHAT | |
http://www.redhat.com/support/errata/RHSA-2005-663.html | vendor-advisory, x_refsource_REDHAT | |
http://www.vupen.com/english/advisories/2005/1878 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.715Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:9795", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "linux-i810-dma-dos(15972)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "RHSA-2005:551", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-551.html", }, { name: "17002", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17002", }, { name: "RHSA-2005:529", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-529.html", }, { name: "RHSA-2005:663", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-663.html", }, { name: "ADV-2005-1878", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2005/1878", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-14T00:00:00", descriptions: [ { lang: "en", value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:9795", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "linux-i810-dma-dos(15972)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972", }, { name: "RHSA-2005:092", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "RHSA-2005:551", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-551.html", }, { name: "17002", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17002", }, { name: "RHSA-2005:529", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-529.html", }, { name: "RHSA-2005:663", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-663.html", }, { name: "ADV-2005-1878", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2005/1878", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1056", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:9795", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795", }, { name: "USN-38-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "linux-i810-dma-dos(15972)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972", }, { name: "RHSA-2005:092", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { name: "RHSA-2005:551", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-551.html", }, { name: "17002", refsource: "SECUNIA", url: "http://secunia.com/advisories/17002", }, { name: "RHSA-2005:529", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-529.html", }, { name: "RHSA-2005:663", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-663.html", }, { name: "ADV-2005-1878", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2005/1878", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1056", datePublished: "2004-12-22T05:00:00", dateReserved: "2004-11-23T00:00:00", dateUpdated: "2024-08-08T00:39:00.715Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-4601 (GCVE-0-2007-4601)
Vulnerability from cvelistv5
Published
2007-08-30 22:00
Modified
2024-08-07 15:01
Severity ?
EPSS score ?
Summary
A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/36364 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26567 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/40140 | vdb-entry, x_refsource_OSVDB | |
http://bugs.debian.org/405342 | x_refsource_MISC | |
https://launchpad.net/bugs/135332 | x_refsource_MISC | |
http://www.ubuntu.com/usn/usn-507-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T15:01:09.683Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "ubuntu-tcpwrapper-security-bypass(36364)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364", }, { name: "26567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26567", }, { name: "40140", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/40140", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://bugs.debian.org/405342", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://launchpad.net/bugs/135332", }, { name: "USN-507-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-507-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-08-30T00:00:00", descriptions: [ { lang: "en", value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-28T12:57:01", orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", shortName: "canonical", }, references: [ { name: "ubuntu-tcpwrapper-security-bypass(36364)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364", }, { name: "26567", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26567", }, { name: "40140", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/40140", }, { tags: [ "x_refsource_MISC", ], url: "http://bugs.debian.org/405342", }, { tags: [ "x_refsource_MISC", ], url: "https://launchpad.net/bugs/135332", }, { name: "USN-507-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-507-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@ubuntu.com", ID: "CVE-2007-4601", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "ubuntu-tcpwrapper-security-bypass(36364)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364", }, { name: "26567", refsource: "SECUNIA", url: "http://secunia.com/advisories/26567", }, { name: "40140", refsource: "OSVDB", url: "http://osvdb.org/40140", }, { name: "http://bugs.debian.org/405342", refsource: "MISC", url: "http://bugs.debian.org/405342", }, { name: "https://launchpad.net/bugs/135332", refsource: "MISC", url: "https://launchpad.net/bugs/135332", }, { name: "USN-507-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-507-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", assignerShortName: "canonical", cveId: "CVE-2007-4601", datePublished: "2007-08-30T22:00:00", dateReserved: "2007-08-30T00:00:00", dateUpdated: "2024-08-07T15:01:09.683Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1067 (GCVE-0-2004-1067)
Vulnerability from cvelistv5
Published
2004-12-10 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18333 | vdb-entry, x_refsource_XF | |
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/11738 | vdb-entry, x_refsource_BID | |
https://www.ubuntu.com/usn/usn-37-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.545Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cyrus-mysaslcanonuser-offbyone-bo(18333)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "11738", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11738", }, { name: "USN-37-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-37-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-02T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "cyrus-mysaslcanonuser-offbyone-bo(18333)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "11738", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11738", }, { name: "USN-37-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-37-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1067", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "cyrus-mysaslcanonuser-offbyone-bo(18333)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333", }, { name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", refsource: "CONFIRM", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "11738", refsource: "BID", url: "http://www.securityfocus.com/bid/11738", }, { name: "USN-37-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-37-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1067", datePublished: "2004-12-10T05:00:00", dateReserved: "2004-11-29T00:00:00", dateUpdated: "2024-08-08T00:39:00.545Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0949 (GCVE-0-2004-0949)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:48.211Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "11695", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10360", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360", }, { name: "USN-30-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-30-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20162", }, { name: "linux-smbrecvtrans2-memory-leak(18137)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "2004-0061", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2004/0061/", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "13232", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13232/", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-17T00:00:00", descriptions: [ { lang: "en", value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "11695", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10360", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360", }, { name: "USN-30-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-30-1/", }, { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20162", }, { name: "linux-smbrecvtrans2-memory-leak(18137)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "2004-0061", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2004/0061/", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "13232", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13232/", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0949", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "11695", refsource: "BID", url: "http://www.securityfocus.com/bid/11695", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041117 Advisory 14/2004: Linux 2.x smbfs multiple remote vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "oval:org.mitre.oval:def:10360", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360", }, { name: "USN-30-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-30-1/", }, { name: "http://security.e-matters.de/advisories/142004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/142004.html", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", refsource: "SECUNIA", url: "http://secunia.com/advisories/20162", }, { name: "linux-smbrecvtrans2-memory-leak(18137)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "2004-0061", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2004/0061/", }, { name: "RHSA-2004:505", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "RHSA-2004:504", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "13232", refsource: "SECUNIA", url: "http://secunia.com/advisories/13232/", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0949", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-10-12T00:00:00", dateUpdated: "2024-08-08T00:31:48.211Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0827 (GCVE-0-2004-0827)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123 | vdb-entry, signature, x_refsource_OVAL | |
http://www.vupen.com/english/advisories/2008/0412 | vdb-entry, x_refsource_VUPEN | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1 | vendor-advisory, x_refsource_SUNALERT | |
http://www.debian.org/security/2004/dsa-547 | vendor-advisory, x_refsource_DEBIAN | |
http://www.redhat.com/support/errata/RHSA-2004-494.html | vendor-advisory, x_refsource_REDHAT | |
http://www.redhat.com/support/errata/RHSA-2004-480.html | vendor-advisory, x_refsource_REDHAT | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1 | vendor-advisory, x_refsource_SUNALERT | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17173 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/28800 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.850Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:11123", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123", }, { name: "ADV-2008-0412", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/0412", }, { name: "201006", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1", }, { name: "DSA-547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-547", }, { name: "RHSA-2004:494", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-494.html", }, { name: "RHSA-2004:480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-480.html", }, { name: "231321", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1", }, { name: "imagemagick-bmp-Bo(17173)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173", }, { name: "28800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28800", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-09-16T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:11123", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123", }, { name: "ADV-2008-0412", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/0412", }, { name: "201006", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1", }, { name: "DSA-547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-547", }, { name: "RHSA-2004:494", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-494.html", }, { name: "RHSA-2004:480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-480.html", }, { name: "231321", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1", }, { name: "imagemagick-bmp-Bo(17173)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173", }, { name: "28800", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28800", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0827", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:11123", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123", }, { name: "ADV-2008-0412", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0412", }, { name: "201006", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1", }, { name: "DSA-547", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-547", }, { name: "RHSA-2004:494", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-494.html", }, { name: "RHSA-2004:480", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-480.html", }, { name: "231321", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1", }, { name: "imagemagick-bmp-Bo(17173)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173", }, { name: "28800", refsource: "SECUNIA", url: "http://secunia.com/advisories/28800", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0827", datePublished: "2004-09-24T04:00:00", dateReserved: "2004-09-02T00:00:00", dateUpdated: "2024-08-08T00:31:47.850Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1068 (GCVE-0-2004-1068)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.709Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "11715", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11715", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "19607", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19607", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20162", }, { name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/381689", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "20060402-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { name: "oval:org.mitre.oval:def:11384", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "linux-afunix-race-condition(18230)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-19T00:00:00", descriptions: [ { lang: "en", value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "11715", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11715", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "19607", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19607", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20162", }, { name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/381689", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "20060402-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2004:505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { name: "oval:org.mitre.oval:def:11384", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384", }, { name: "RHSA-2004:504", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "linux-afunix-race-condition(18230)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1068", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "11715", refsource: "BID", url: "http://www.securityfocus.com/bid/11715", }, { name: "SUSE-SA:2004:044", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "19607", refsource: "SECUNIA", url: "http://secunia.com/advisories/19607", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:537", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { name: "20162", refsource: "SECUNIA", url: "http://secunia.com/advisories/20162", }, { name: "20041119 Addendum, recent Linux <= 2.4.27 vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/381689", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "20060402-01-U", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { name: "RHSA-2004:505", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "oval:org.mitre.oval:def:11384", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384", }, { name: "RHSA-2004:504", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { name: "linux-afunix-race-condition(18230)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1068", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-29T00:00:00", dateUpdated: "2024-08-08T00:39:00.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-3920 (GCVE-0-2007-3920)
Vulnerability from cvelistv5
Published
2007-10-29 21:00
Modified
2024-08-07 14:37
Severity ?
EPSS score ?
Summary
GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T14:37:05.347Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", }, { name: "oval:org.mitre.oval:def:10192", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192", }, { name: "FEDORA-2008-0956", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html", }, { name: "USN-537-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-537-2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", }, { name: "30715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30715", }, { name: "gnomescreensaver-compiz-security-bypass(37410)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410", }, { name: "SUSE-SA:2008:027", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html", }, { name: "USN-537-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-537-1", }, { name: "FEDORA-2008-0930", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html", }, { name: "26188", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/26188", }, { name: "RHSA-2008:0485", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html", }, { name: "27381", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27381", }, { name: "28627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28627", }, { name: "30329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30329", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-10-23T00:00:00", descriptions: [ { lang: "en", value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", }, { name: "oval:org.mitre.oval:def:10192", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192", }, { name: "FEDORA-2008-0956", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html", }, { name: "USN-537-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-537-2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", }, { name: "30715", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30715", }, { name: "gnomescreensaver-compiz-security-bypass(37410)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410", }, { name: "SUSE-SA:2008:027", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html", }, { name: "USN-537-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-537-1", }, { name: "FEDORA-2008-0930", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html", }, { name: "26188", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/26188", }, { name: "RHSA-2008:0485", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html", }, { name: "27381", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27381", }, { name: "28627", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28627", }, { name: "30329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30329", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-3920", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", }, { name: "oval:org.mitre.oval:def:10192", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192", }, { name: "FEDORA-2008-0956", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html", }, { name: "USN-537-2", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-537-2", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", }, { name: "30715", refsource: "SECUNIA", url: "http://secunia.com/advisories/30715", }, { name: "gnomescreensaver-compiz-security-bypass(37410)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410", }, { name: "SUSE-SA:2008:027", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html", }, { name: "USN-537-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-537-1", }, { name: "FEDORA-2008-0930", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html", }, { name: "26188", refsource: "BID", url: "http://www.securityfocus.com/bid/26188", }, { name: "RHSA-2008:0485", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html", }, { name: "27381", refsource: "SECUNIA", url: "http://secunia.com/advisories/27381", }, { name: "28627", refsource: "SECUNIA", url: "http://secunia.com/advisories/28627", }, { name: "30329", refsource: "SECUNIA", url: "http://secunia.com/advisories/30329", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-3920", datePublished: "2007-10-29T21:00:00", dateReserved: "2007-07-20T00:00:00", dateUpdated: "2024-08-07T14:37:05.347Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0109 (GCVE-0-2005-0109)
Vulnerability from cvelistv5
Published
2005-03-08 05:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T20:57:41.235Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VU#911878", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/911878", }, { name: "18165", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18165", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", }, { name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2", }, { name: "SCOSA-2005.24", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt", }, { name: "oval:org.mitre.oval:def:9747", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747", }, { name: "ADV-2005-3002", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2005/3002", }, { name: "15348", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/15348", }, { name: "12724", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12724", }, { name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2", }, { name: "RHSA-2005:476", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-476.html", }, { name: "1013967", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1013967", }, { name: "ADV-2005-0540", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2005/0540", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.daemonology.net/papers/htt.pdf", }, { name: "RHSA-2005:800", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-800.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.daemonology.net/hyperthreading-considered-harmful/", }, { name: "101739", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1", }, { name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-03-04T00:00:00", descriptions: [ { lang: "en", value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "VU#911878", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/911878", }, { name: "18165", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18165", }, { tags: [ "x_refsource_MISC", ], url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", }, { name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2", }, { name: "SCOSA-2005.24", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt", }, { name: "oval:org.mitre.oval:def:9747", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747", }, { name: "ADV-2005-3002", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2005/3002", }, { name: "15348", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/15348", }, { name: "12724", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12724", }, { name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2", }, { name: "RHSA-2005:476", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-476.html", }, { name: "1013967", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1013967", }, { name: "ADV-2005-0540", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2005/0540", }, { tags: [ "x_refsource_MISC", ], url: "http://www.daemonology.net/papers/htt.pdf", }, { name: "RHSA-2005:800", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-800.html", }, { tags: [ "x_refsource_MISC", ], url: "http://www.daemonology.net/hyperthreading-considered-harmful/", }, { name: "101739", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1", }, { name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0109", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "VU#911878", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/911878", }, { name: "18165", refsource: "SECUNIA", url: "http://secunia.com/advisories/18165", }, { name: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", refsource: "MISC", url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", }, { name: "[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff", refsource: "MLIST", url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2", }, { name: "SCOSA-2005.24", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt", }, { name: "oval:org.mitre.oval:def:9747", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747", }, { name: "ADV-2005-3002", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2005/3002", }, { name: "15348", refsource: "SECUNIA", url: "http://secunia.com/advisories/15348", }, { name: "12724", refsource: "BID", url: "http://www.securityfocus.com/bid/12724", }, { name: "[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]", refsource: "MLIST", url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2", }, { name: "RHSA-2005:476", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-476.html", }, { name: "1013967", refsource: "SECTRACK", url: "http://securitytracker.com/id?1013967", }, { name: "ADV-2005-0540", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2005/0540", }, { name: "http://www.daemonology.net/papers/htt.pdf", refsource: "MISC", url: "http://www.daemonology.net/papers/htt.pdf", }, { name: "RHSA-2005:800", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-800.html", }, { name: "http://www.daemonology.net/hyperthreading-considered-harmful/", refsource: "MISC", url: "http://www.daemonology.net/hyperthreading-considered-harmful/", }, { name: "101739", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1", }, { name: "[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff", refsource: "MLIST", url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0109", datePublished: "2005-03-08T05:00:00", dateReserved: "2005-01-18T00:00:00", dateUpdated: "2024-08-07T20:57:41.235Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1016 (GCVE-0-2004-1016)
Vulnerability from cvelistv5
Published
2004-12-15 05:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.670Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "linux-scmsend-dos(18483)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:689", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-689.html", }, { name: "RHSA-2005:016", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20162", }, { name: "11921", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11921", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "oval:org.mitre.oval:def:11816", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-14T00:00:00", descriptions: [ { lang: "en", value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "linux-scmsend-dos(18483)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "USN-38-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:689", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-689.html", }, { name: "RHSA-2005:016", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20162", }, { name: "11921", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11921", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "oval:org.mitre.oval:def:11816", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { tags: [ "x_refsource_MISC", ], url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1016", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "linux-scmsend-dos(18483)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "RHSA-2005:017", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { name: "FLSA:2336", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { name: "USN-38-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-38-1/", }, { name: "SUSE-SA:2004:044", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "RHSA-2004:689", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-689.html", }, { name: "RHSA-2005:016", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { name: "20162", refsource: "SECUNIA", url: "http://secunia.com/advisories/20162", }, { name: "11921", refsource: "BID", url: "http://www.securityfocus.com/bid/11921", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "oval:org.mitre.oval:def:11816", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", refsource: "MISC", url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1016", datePublished: "2004-12-15T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:38:59.670Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0966 (GCVE-0-2004-0966)
Vulnerability from cvelistv5
Published
2004-10-20 04:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html | vendor-advisory, x_refsource_FEDORA | |
http://marc.info/?l=bugtraq&m=110382652226638&w=2 | vendor-advisory, x_refsource_OPENPKG | |
http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17583 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/11282 | vdb-entry, x_refsource_BID | |
http://www.trustix.org/errata/2004/0050 | vendor-advisory, x_refsource_TRUSTIX | |
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323 | x_refsource_CONFIRM | |
https://www.ubuntu.com/usn/usn-5-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051 | vendor-advisory, x_refsource_MANDRIVA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.470Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "FLSA:136323", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html", }, { name: "OpenPKG-SA-2004.055", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2", }, { name: "GLSA-200410-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml", }, { name: "script-temporary-file-overwrite(17583)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "11282", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11282", }, { name: "2004-0050", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2004/0050", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", }, { name: "USN-5-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-5-1/", }, { name: "MDKSA-2006:051", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-09-30T00:00:00", descriptions: [ { lang: "en", value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "FLSA:136323", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html", }, { name: "OpenPKG-SA-2004.055", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2", }, { name: "GLSA-200410-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml", }, { name: "script-temporary-file-overwrite(17583)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "11282", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11282", }, { name: "2004-0050", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2004/0050", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", }, { name: "USN-5-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-5-1/", }, { name: "MDKSA-2006:051", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0966", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "FLSA:136323", refsource: "FEDORA", url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html", }, { name: "OpenPKG-SA-2004.055", refsource: "OPENPKG", url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2", }, { name: "GLSA-200410-10", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml", }, { name: "script-temporary-file-overwrite(17583)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { name: "11282", refsource: "BID", url: "http://www.securityfocus.com/bid/11282", }, { name: "2004-0050", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2004/0050", }, { name: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", refsource: "CONFIRM", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", }, { name: "USN-5-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-5-1/", }, { name: "MDKSA-2006:051", refsource: "MANDRIVA", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0966", datePublished: "2004-10-20T04:00:00", dateReserved: "2004-10-19T00:00:00", dateUpdated: "2024-08-08T00:38:59.470Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-5466 (GCVE-0-2006-5466)
Vulnerability from cvelistv5
Published
2006-11-06 17:00
Modified
2024-08-07 19:48
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
References
▼ | URL | Tags |
---|---|---|
http://security.gentoo.org/glsa/glsa-200611-08.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/22740 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/22854 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ubuntu.com/usn/usn-378-1 | vendor-advisory, x_refsource_UBUNTU | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833 | x_refsource_MISC | |
http://securitytracker.com/id?1017160 | vdb-entry, x_refsource_SECTRACK | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/20906 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/22745 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/22768 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/4350 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T19:48:30.563Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "GLSA-200611-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200611-08.xml", }, { name: "22740", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22740", }, { name: "22854", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22854", }, { name: "USN-378-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-378-1", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833", }, { name: "1017160", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1017160", }, { name: "MDKSA-2006:200", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200", }, { name: "20906", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/20906", }, { name: "22745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22745", }, { name: "22768", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/22768", }, { name: "ADV-2006-4350", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/4350", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-11-04T00:00:00", descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2006-11-15T10:00:00", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "GLSA-200611-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200611-08.xml", }, { name: "22740", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22740", }, { name: "22854", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22854", }, { name: "USN-378-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-378-1", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833", }, { name: "1017160", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1017160", }, { name: "MDKSA-2006:200", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200", }, { name: "20906", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/20906", }, { name: "22745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22745", }, { name: "22768", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/22768", }, { name: "ADV-2006-4350", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/4350", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2006-5466", datePublished: "2006-11-06T17:00:00", dateReserved: "2006-10-23T00:00:00", dateUpdated: "2024-08-07T19:48:30.563Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-1999-1572 (GCVE-0-1999-1572)
Vulnerability from cvelistv5
Published
2005-01-29 05:00
Modified
2024-08-01 17:18
Severity ?
EPSS score ?
Summary
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-01T17:18:07.480Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20050204 [USN-75-1] cpio vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2", }, { name: "RHSA-2005:073", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-073.html", }, { name: "cpio-o-archive-insecure-permissions(19167)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", }, { name: "17063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17063", }, { name: "17532", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17532", }, { name: "2005-0003", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2005/0003/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", }, { name: "RHSA-2005:080", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-080.html", }, { name: "oval:org.mitre.oval:def:10888", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", }, { name: "14357", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/14357", }, { name: "MDKSA-2005:032", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", }, { name: "DSA-664", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-664", }, { name: "RHSA-2005:806", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-806.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "1997-02-24T00:00:00", descriptions: [ { lang: "en", value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-18T16:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20050204 [USN-75-1] cpio vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2", }, { name: "RHSA-2005:073", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-073.html", }, { name: "cpio-o-archive-insecure-permissions(19167)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", }, { name: "17063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17063", }, { name: "17532", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17532", }, { name: "2005-0003", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2005/0003/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", }, { name: "RHSA-2005:080", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-080.html", }, { name: "oval:org.mitre.oval:def:10888", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", }, { tags: [ "x_refsource_MISC", ], url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", }, { name: "14357", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/14357", }, { name: "MDKSA-2005:032", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", }, { name: "DSA-664", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-664", }, { name: "RHSA-2005:806", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-806.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-1999-1572", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20050204 [USN-75-1] cpio vulnerability", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2", }, { name: "RHSA-2005:073", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-073.html", }, { name: "cpio-o-archive-insecure-permissions(19167)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", }, { name: "17063", refsource: "SECUNIA", url: "http://secunia.com/advisories/17063", }, { name: "17532", refsource: "SECUNIA", url: "http://secunia.com/advisories/17532", }, { name: "2005-0003", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2005/0003/", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", }, { name: "RHSA-2005:080", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-080.html", }, { name: "oval:org.mitre.oval:def:10888", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", }, { name: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", refsource: "MISC", url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", }, { name: "14357", refsource: "SECUNIA", url: "http://secunia.com/advisories/14357", }, { name: "MDKSA-2005:032", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", }, { name: "DSA-664", refsource: "DEBIAN", url: "http://www.debian.org/security/2005/dsa-664", }, { name: "RHSA-2005:806", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-806.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-1999-1572", datePublished: "2005-01-29T05:00:00", dateReserved: "2005-01-27T00:00:00", dateUpdated: "2024-08-01T17:18:07.480Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-5648 (GCVE-0-2006-5648)
Vulnerability from cvelistv5
Published
2006-12-14 00:00
Modified
2025-04-03 15:31
Severity ?
EPSS score ?
Summary
Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/linux/security/advisories/2006_79_kernel.html | vendor-advisory, x_refsource_SUSE | |
http://secunia.com/advisories/23361 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/23384 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/21582 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/23474 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ubuntu.com/usn/usn-395-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T19:55:54.157Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SA:2006:079", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23361", }, { name: "23384", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23384", }, { name: "21582", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/21582", }, { name: "23474", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/23474", }, { name: "USN-395-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2006-5648", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-04-03T15:29:54.817209Z", version: "2.0.3", }, type: "ssvc", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400 Uncontrolled Resource Consumption", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-04-03T15:31:11.902Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-12-13T00:00:00.000Z", descriptions: [ { lang: "en", value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2006-12-28T10:00:00.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "SUSE-SA:2006:079", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23361", }, { name: "23384", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23384", }, { name: "21582", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/21582", }, { name: "23474", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/23474", }, { name: "USN-395-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-5648", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SA:2006:079", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { name: "23361", refsource: "SECUNIA", url: "http://secunia.com/advisories/23361", }, { name: "23384", refsource: "SECUNIA", url: "http://secunia.com/advisories/23384", }, { name: "21582", refsource: "BID", url: "http://www.securityfocus.com/bid/21582", }, { name: "23474", refsource: "SECUNIA", url: "http://secunia.com/advisories/23474", }, { name: "USN-395-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-395-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-5648", datePublished: "2006-12-14T00:00:00.000Z", dateReserved: "2006-11-01T00:00:00.000Z", dateUpdated: "2025-04-03T15:31:11.902Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0888 (GCVE-0-2004-0888)
Vulnerability from cvelistv5
Published
2004-10-26 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.615Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2004:592", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-592.html", }, { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:066", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-066.html", }, { name: "USN-9-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-9-1/", }, { name: "MDKSA-2004:113", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "DSA-581", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-581", }, { name: "DSA-573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-573", }, { name: "FLSA:2353", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353", }, { name: "MDKSA-2004:116", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", }, { name: "DSA-599", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-599", }, { name: "xpdf-pdf-bo(17818)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "RHSA-2005:354", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-354.html", }, { name: "RHSA-2004:543", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-543.html", }, { name: "oval:org.mitre.oval:def:9714", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", }, { name: "CLA-2004:886", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", }, { name: "MDKSA-2004:114", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", }, { name: "GLSA-200410-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "MDKSA-2004:115", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", }, { name: "SUSE-SA:2004:039", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { name: "FLSA:2352", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-21T00:00:00", descriptions: [ { lang: "en", value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2004:592", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-592.html", }, { name: "11501", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:066", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-066.html", }, { name: "USN-9-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-9-1/", }, { name: "MDKSA-2004:113", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "DSA-581", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-581", }, { name: "DSA-573", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-573", }, { name: "FLSA:2353", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353", }, { name: "MDKSA-2004:116", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", }, { name: "DSA-599", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-599", }, { name: "xpdf-pdf-bo(17818)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "RHSA-2005:354", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-354.html", }, { name: "RHSA-2004:543", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-543.html", }, { name: "oval:org.mitre.oval:def:9714", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", }, { name: "CLA-2004:886", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", }, { name: "MDKSA-2004:114", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", }, { name: "GLSA-200410-30", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "MDKSA-2004:115", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", }, { name: "SUSE-SA:2004:039", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { name: "FLSA:2352", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0888", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2004:592", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-592.html", }, { name: "11501", refsource: "BID", url: "http://www.securityfocus.com/bid/11501", }, { name: "RHSA-2005:066", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-066.html", }, { name: "USN-9-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-9-1/", }, { name: "MDKSA-2004:113", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { name: "GLSA-200410-20", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { name: "DSA-581", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-581", }, { name: "DSA-573", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-573", }, { name: "FLSA:2353", refsource: "FEDORA", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353", }, { name: "MDKSA-2004:116", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", }, { name: "DSA-599", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-599", }, { name: "xpdf-pdf-bo(17818)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { name: "RHSA-2005:354", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-354.html", }, { name: "RHSA-2004:543", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-543.html", }, { name: "oval:org.mitre.oval:def:9714", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", }, { name: "CLA-2004:886", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", }, { name: "MDKSA-2004:114", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", }, { name: "GLSA-200410-30", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { name: "MDKSA-2004:115", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", }, { name: "SUSE-SA:2004:039", refsource: "SUSE", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { name: "FLSA:2352", refsource: "FEDORA", url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0888", datePublished: "2004-10-26T04:00:00", dateReserved: "2004-09-22T00:00:00", dateUpdated: "2024-08-08T00:31:47.615Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-3378 (GCVE-0-2006-3378)
Vulnerability from cvelistv5
Published
2006-07-06 20:00
Modified
2024-08-07 18:23
Severity ?
EPSS score ?
Summary
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/21480 | third-party-advisory, x_refsource_SECUNIA | |
http://www.osvdb.org/26995 | vdb-entry, x_refsource_OSVDB | |
http://www.debian.org/security/2006/dsa-1150 | vendor-advisory, x_refsource_DEBIAN | |
http://www.ubuntu.com/usn/usn-308-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/18850 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/20966 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/20950 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T18:23:21.269Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "21480", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21480", }, { name: "26995", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/26995", }, { name: "DSA-1150", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1150", }, { name: "USN-308-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-308-1", }, { name: "18850", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/18850", }, { name: "20966", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20966", }, { name: "20950", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20950", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-07-05T00:00:00", descriptions: [ { lang: "en", value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2006-07-13T09:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "21480", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21480", }, { name: "26995", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/26995", }, { name: "DSA-1150", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1150", }, { name: "USN-308-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-308-1", }, { name: "18850", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/18850", }, { name: "20966", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20966", }, { name: "20950", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20950", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-3378", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "21480", refsource: "SECUNIA", url: "http://secunia.com/advisories/21480", }, { name: "26995", refsource: "OSVDB", url: "http://www.osvdb.org/26995", }, { name: "DSA-1150", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1150", }, { name: "USN-308-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-308-1", }, { name: "18850", refsource: "BID", url: "http://www.securityfocus.com/bid/18850", }, { name: "20966", refsource: "SECUNIA", url: "http://secunia.com/advisories/20966", }, { name: "20950", refsource: "SECUNIA", url: "http://secunia.com/advisories/20950", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-3378", datePublished: "2006-07-06T20:00:00", dateReserved: "2006-07-06T00:00:00", dateUpdated: "2024-08-07T18:23:21.269Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2008-5104 (GCVE-0-2008-5104)
Vulnerability from cvelistv5
Published
2008-11-17 18:00
Modified
2024-08-07 10:40
Severity ?
EPSS score ?
Summary
Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32697 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/32292 | vdb-entry, x_refsource_BID | |
http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/usn-670-1 | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46881 | vdb-entry, x_refsource_XF | |
https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T10:40:16.998Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "32697", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/32697", }, { name: "32292", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/32292", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-root-default-password(46881)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-11-13T00:00:00", descriptions: [ { lang: "en", value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-08-07T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "32697", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/32697", }, { name: "32292", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/32292", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-root-default-password(46881)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-5104", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "32697", refsource: "SECUNIA", url: "http://secunia.com/advisories/32697", }, { name: "32292", refsource: "BID", url: "http://www.securityfocus.com/bid/32292", }, { name: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", refsource: "CONFIRM", url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { name: "USN-670-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-670-1", }, { name: "vmbuilder-root-default-password(46881)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881", }, { name: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", refsource: "CONFIRM", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-5104", datePublished: "2008-11-17T18:00:00", dateReserved: "2008-11-17T00:00:00", dateUpdated: "2024-08-07T10:40:16.998Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1013 (GCVE-0-2004-1013)
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2004/dsa-597 | vendor-advisory, x_refsource_DEBIAN | |
http://security.e-matters.de/advisories/152004.html | x_refsource_MISC | |
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110123023521619&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/13274/ | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-200411-34.xml | vendor-advisory, x_refsource_GENTOO | |
https://www.ubuntu.com/usn/usn-31-1/ | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.800Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-597", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/152004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-22T00:00:00", descriptions: [ { lang: "en", value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-06T21:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-597", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-597", }, { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/152004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1013", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-597", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-597", }, { name: "http://security.e-matters.de/advisories/152004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/152004.html", }, { name: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", refsource: "CONFIRM", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { name: "MDKSA-2004:139", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { name: "20041122 Advisory 15/2004: Cyrus IMAP Server multiple remote vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { name: "[cyrus-announce] 20041122 Cyrus IMAPd 2.2.9 Released", refsource: "MLIST", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { name: "13274", refsource: "SECUNIA", url: "http://secunia.com/advisories/13274/", }, { name: "GLSA-200411-34", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { name: "USN-31-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1013", datePublished: "2004-12-01T05:00:00", dateReserved: "2004-11-04T00:00:00", dateUpdated: "2024-08-08T00:38:59.800Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2006-0151 (GCVE-0-2006-0151)
Vulnerability from cvelistv5
Published
2006-01-09 23:00
Modified
2024-08-07 16:25
Severity ?
EPSS score ?
Summary
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T16:25:33.651Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "2006-0010", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2006/0010", }, { name: "18549", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18549", }, { name: "18558", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18558", }, { name: "SSA:2006-045-08", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822", }, { name: "18363", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18363", }, { name: "SUSE-SR:2006:002", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html", }, { name: "18358", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18358", }, { name: "16184", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16184", }, { name: "19016", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19016", }, { name: "18906", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18906", }, { name: "DSA-946", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-946", }, { name: "MDKSA-2006:159", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159", }, { name: "USN-235-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/235-2/", }, { name: "21692", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/21692", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-01-09T00:00:00", descriptions: [ { lang: "en", value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "2006-0010", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2006/0010", }, { name: "18549", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18549", }, { name: "18558", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18558", }, { name: "SSA:2006-045-08", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822", }, { name: "18363", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18363", }, { name: "SUSE-SR:2006:002", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html", }, { name: "18358", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18358", }, { name: "16184", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16184", }, { name: "19016", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19016", }, { name: "18906", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18906", }, { name: "DSA-946", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-946", }, { name: "MDKSA-2006:159", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159", }, { name: "USN-235-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/235-2/", }, { name: "21692", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/21692", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2006-0151", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "2006-0010", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2006/0010", }, { name: "18549", refsource: "SECUNIA", url: "http://secunia.com/advisories/18549", }, { name: "18558", refsource: "SECUNIA", url: "http://secunia.com/advisories/18558", }, { name: "SSA:2006-045-08", refsource: "SLACKWARE", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822", }, { name: "18363", refsource: "SECUNIA", url: "http://secunia.com/advisories/18363", }, { name: "SUSE-SR:2006:002", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html", }, { name: "18358", refsource: "SECUNIA", url: "http://secunia.com/advisories/18358", }, { name: "16184", refsource: "BID", url: "http://www.securityfocus.com/bid/16184", }, { name: "19016", refsource: "SECUNIA", url: "http://secunia.com/advisories/19016", }, { name: "18906", refsource: "SECUNIA", url: "http://secunia.com/advisories/18906", }, { name: "DSA-946", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-946", }, { name: "MDKSA-2006:159", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159", }, { name: "USN-235-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/235-2/", }, { name: "21692", refsource: "SECUNIA", url: "http://secunia.com/advisories/21692", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2006-0151", datePublished: "2006-01-09T23:00:00", dateReserved: "2006-01-09T00:00:00", dateUpdated: "2024-08-07T16:25:33.651Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-1527 (GCVE-0-2005-1527)
Vulnerability from cvelistv5
Published
2005-08-15 04:00
Modified
2024-08-07 21:51
Severity ?
EPSS score ?
Summary
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/18696 | vdb-entry, x_refsource_OSVDB | |
https://usn.ubuntu.com/167-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.securiteam.com/unixfocus/5DP0J00GKE.html | x_refsource_MISC | |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor-advisory, x_refsource_SUSE | |
http://www.debian.org/security/2005/dsa-892 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/17463 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21769 | vdb-entry, x_refsource_XF | |
http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false | third-party-advisory, x_refsource_IDEFENSE | |
http://secunia.com/advisories/16412 | third-party-advisory, x_refsource_SECUNIA | |
http://securitytracker.com/id?1014636 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/14525 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:51:50.264Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "18696", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/18696", }, { name: "USN-167-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/167-1/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html", }, { name: "SUSE-SR:2005:019", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html", }, { name: "DSA-892", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-892", }, { name: "17463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/17463", }, { name: "awstats-eval-execute-commands(21769)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769", }, { name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false", }, { name: "16412", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/16412", }, { name: "1014636", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1014636", }, { name: "14525", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/14525", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-08-09T00:00:00", descriptions: [ { lang: "en", value: "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "18696", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/18696", }, { name: "USN-167-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/167-1/", }, { tags: [ "x_refsource_MISC", ], url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html", }, { name: "SUSE-SR:2005:019", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html", }, { name: "DSA-892", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-892", }, { name: "17463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/17463", }, { name: "awstats-eval-execute-commands(21769)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769", }, { name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false", }, { name: "16412", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/16412", }, { name: "1014636", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1014636", }, { name: "14525", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/14525", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-1527", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "18696", refsource: "OSVDB", url: "http://www.osvdb.org/18696", }, { name: "USN-167-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/167-1/", }, { name: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html", refsource: "MISC", url: "http://www.securiteam.com/unixfocus/5DP0J00GKE.html", }, { name: "SUSE-SR:2005:019", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_19_sr.html", }, { name: "DSA-892", refsource: "DEBIAN", url: "http://www.debian.org/security/2005/dsa-892", }, { name: "17463", refsource: "SECUNIA", url: "http://secunia.com/advisories/17463", }, { name: "awstats-eval-execute-commands(21769)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769", }, { name: "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability", refsource: "IDEFENSE", url: "http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false", }, { name: "16412", refsource: "SECUNIA", url: "http://secunia.com/advisories/16412", }, { name: "1014636", refsource: "SECTRACK", url: "http://securitytracker.com/id?1014636", }, { name: "14525", refsource: "BID", url: "http://www.securityfocus.com/bid/14525", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-1527", datePublished: "2005-08-15T04:00:00", dateReserved: "2005-05-12T00:00:00", dateUpdated: "2024-08-07T21:51:50.264Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-2637 (GCVE-0-2007-2637)
Vulnerability from cvelistv5
Published
2007-05-13 23:00
Modified
2024-08-07 13:49
Severity ?
EPSS score ?
Summary
MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/36269 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/29262 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/25208 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34474 | vdb-entry, x_refsource_XF | |
http://www.ubuntu.com/usn/usn-458-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2008/dsa-1514 | vendor-advisory, x_refsource_DEBIAN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:49:56.023Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "36269", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/36269", }, { name: "29262", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29262", }, { name: "25208", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25208", }, { name: "moinmoin-acl-information-disclosure(34474)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474", }, { name: "USN-458-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-458-1", }, { name: "DSA-1514", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2008/dsa-1514", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-05-08T00:00:00", descriptions: [ { lang: "en", value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-28T12:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "36269", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/36269", }, { name: "29262", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29262", }, { name: "25208", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25208", }, { name: "moinmoin-acl-information-disclosure(34474)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474", }, { name: "USN-458-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-458-1", }, { name: "DSA-1514", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2008/dsa-1514", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2637", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "36269", refsource: "OSVDB", url: "http://osvdb.org/36269", }, { name: "29262", refsource: "SECUNIA", url: "http://secunia.com/advisories/29262", }, { name: "25208", refsource: "SECUNIA", url: "http://secunia.com/advisories/25208", }, { name: "moinmoin-acl-information-disclosure(34474)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474", }, { name: "USN-458-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-458-1", }, { name: "DSA-1514", refsource: "DEBIAN", url: "http://www.debian.org/security/2008/dsa-1514", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-2637", datePublished: "2007-05-13T23:00:00", dateReserved: "2007-05-13T00:00:00", dateUpdated: "2024-08-07T13:49:56.023Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2009-0578 (GCVE-0-2009-0578)
Vulnerability from cvelistv5
Published
2009-03-05 02:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
References
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-727-1 | vendor-advisory, x_refsource_UBUNTU | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/33966 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49063 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/34067 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.redhat.com/show_bug.cgi?id=487752 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1021909 | vdb-entry, x_refsource_SECTRACK | |
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html | vendor-advisory, x_refsource_SUSE | |
http://www.redhat.com/support/errata/RHSA-2009-0361.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/34473 | third-party-advisory, x_refsource_SECUNIA |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T04:40:05.071Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-727-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { name: "oval:org.mitre.oval:def:8931", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931", }, { name: "33966", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/33966", }, { name: "networkmanager-dbus-security-bypass(49063)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063", }, { name: "34067", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34067", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { name: "1021909", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1021909", }, { name: "SUSE-SR:2009:009", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { name: "SUSE-SA:2009:013", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { name: "RHSA-2009:0361", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { name: "34473", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/34473", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2009-03-03T00:00:00", descriptions: [ { lang: "en", value: "GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-28T12:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "USN-727-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { name: "oval:org.mitre.oval:def:8931", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931", }, { name: "33966", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/33966", }, { name: "networkmanager-dbus-security-bypass(49063)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063", }, { name: "34067", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34067", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { name: "1021909", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1021909", }, { name: "SUSE-SR:2009:009", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { name: "SUSE-SA:2009:013", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { name: "RHSA-2009:0361", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { name: "34473", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/34473", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2009-0578", datePublished: "2009-03-05T02:00:00", dateReserved: "2009-02-13T00:00:00", dateUpdated: "2024-08-07T04:40:05.071Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-3624 (GCVE-0-2005-3624)
Vulnerability from cvelistv5
Published
2006-01-06 22:00
Modified
2024-08-07 23:17
Severity ?
EPSS score ?
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T23:17:23.457Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18349", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18373", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-962", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18428", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18908", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "xpdf-ccitt-faxstream-bo(24022)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18389", }, { name: "oval:org.mitre.oval:def:9437", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/18385", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2006-01-06T00:00:00", descriptions: [ { lang: "en", value: "The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-19T14:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "16143", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/16143", }, { name: "DSA-932", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-932", }, { name: "18349", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18349", }, { name: "18147", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18147", }, { name: "SCOSA-2006.15", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { name: "18679", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18679", }, { name: "18312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18312", }, { name: "18644", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18644", }, { name: "USN-236-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/236-1/", }, { name: "18425", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18425", }, { name: "18373", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18373", }, { name: "18303", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18303", }, { name: "DSA-931", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-931", }, { name: "18554", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18554", }, { name: "MDKSA-2006:003", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { name: "19230", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19230", }, { name: "102972", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { name: "MDKSA-2006:012", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { name: "DSA-962", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-962", }, { name: "RHSA-2006:0163", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { name: "DSA-937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-937", }, { name: "18398", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18398", }, { name: "FLSA-2006:176751", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { name: "2006-0002", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2006/0002/", }, { name: "SUSE-SA:2006:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { name: "DSA-936", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-936", }, { name: "FEDORA-2005-026", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { name: "18329", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18329", }, { name: "18463", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18463", }, { name: "18642", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18642", }, { name: "18674", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18674", }, { name: "MDKSA-2006:005", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { name: "18313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18313", }, { name: "20051201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { name: "20060101-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { name: "18448", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18448", }, { name: "18436", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18436", }, { name: "18428", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18428", }, { name: "18380", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18380", }, { name: "18423", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18423", }, { name: "18416", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18416", }, { name: "RHSA-2006:0177", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { name: "ADV-2007-2280", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/2280", }, { name: "GLSA-200601-02", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { name: "18407", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18407", }, { name: "18332", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18332", }, { name: "18517", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18517", }, { name: "18582", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18582", }, { name: "18534", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18534", }, { name: "SSA:2006-045-09", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { name: "18908", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18908", }, { name: "25729", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25729", }, { name: "18414", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18414", }, { name: "MDKSA-2006:006", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { name: "18338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18338", }, { name: "MDKSA-2006:008", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { name: "20060201-01-U", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { name: "RHSA-2006:0160", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { name: "MDKSA-2006:010", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { name: "DSA-940", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-940", }, { name: "MDKSA-2006:004", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { name: "ADV-2006-0047", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2006/0047", }, { name: "GLSA-200601-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { name: "xpdf-ccitt-faxstream-bo(24022)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", }, { name: "18389", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18389", }, { name: "oval:org.mitre.oval:def:9437", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", }, { name: "SSA:2006-045-04", tags: [ "vendor-advisory", "x_refsource_SLACKWARE", ], url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { name: "19377", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/19377", }, { name: "FEDORA-2005-025", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { name: "FLSA:175404", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { name: "DSA-961", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-961", }, { name: "18675", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18675", }, { name: "18913", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18913", }, { name: "DSA-938", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2005/dsa-938", }, { name: "18334", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18334", }, { name: "18375", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18375", }, { name: "DSA-950", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-950", }, { name: "18387", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18387", }, { name: "MDKSA-2006:011", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { name: "18385", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/18385", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2005-3624", datePublished: "2006-01-06T22:00:00", dateReserved: "2005-11-16T00:00:00", dateUpdated: "2024-08-07T23:17:23.457Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0983 (GCVE-0-2004-0983)
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2004-635.html | vendor-advisory, x_refsource_REDHAT | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:128 | vendor-advisory, x_refsource_MANDRAKE | |
http://www.securityfocus.com/bid/11618 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268 | vdb-entry, signature, x_refsource_OVAL | |
https://usn.ubuntu.com/20-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.debian.org/security/2004/dsa-586 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17985 | vdb-entry, x_refsource_XF |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.645Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "RHSA-2004:635", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-635.html", }, { name: "MDKSA-2004:128", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128", }, { name: "11618", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11618", }, { name: "oval:org.mitre.oval:def:10268", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268", }, { name: "USN-20-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/20-1/", }, { name: "DSA-586", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-586", }, { name: "ruby-cgi-dos(17985)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-08T00:00:00", descriptions: [ { lang: "en", value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "RHSA-2004:635", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-635.html", }, { name: "MDKSA-2004:128", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128", }, { name: "11618", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11618", }, { name: "oval:org.mitre.oval:def:10268", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268", }, { name: "USN-20-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/20-1/", }, { name: "DSA-586", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-586", }, { name: "ruby-cgi-dos(17985)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0983", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "RHSA-2004:635", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-635.html", }, { name: "MDKSA-2004:128", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128", }, { name: "11618", refsource: "BID", url: "http://www.securityfocus.com/bid/11618", }, { name: "oval:org.mitre.oval:def:10268", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268", }, { name: "USN-20-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/20-1/", }, { name: "DSA-586", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-586", }, { name: "ruby-cgi-dos(17985)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0983", datePublished: "2004-11-19T05:00:00", dateReserved: "2004-10-24T00:00:00", dateUpdated: "2024-08-08T00:38:59.645Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-4137 (GCVE-0-2007-4137)
Vulnerability from cvelistv5
Published
2007-09-18 19:00
Modified
2024-08-07 14:46
Severity ?
EPSS score ?
Summary
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T14:46:38.696Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=192472", }, { name: "MDKSA-2007:183", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183", }, { name: "SUSE-SR:2007:019", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { name: "26868", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26868", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-1751", }, { name: "26811", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26811", }, { name: "oval:org.mitre.oval:def:11159", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159", }, { name: "27053", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27053", }, { name: "27996", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27996", }, { name: "27275", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27275", }, { name: "27382", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/27382", }, { name: "26857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119", }, { name: "26778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26778", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001", }, { name: "26882", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26882", }, { name: "26987", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26987", }, { name: "GLSA-200710-28", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200710-28.xml", }, { name: "ADV-2007-3144", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/3144", }, { name: "20070901-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://dist.trolltech.com/developer/download/175791_4.diff", }, { name: "39384", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/39384", }, { name: "26804", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26804", }, { name: "26782", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/26782", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://dist.trolltech.com/developer/download/175791_3.diff", }, { name: "FEDORA-2007-703", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml", }, { name: "FEDORA-2007-2216", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml", }, { name: "GLSA-200712-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200712-08.xml", }, { name: "28021", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28021", }, { name: "RHSA-2007:0883", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html", }, { name: "1018688", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1018688", }, { name: "20071004 FLEA-2007-0059-1 qt qt-tools", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded", }, { name: "USN-513-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-513-1", }, { name: "25657", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/25657", }, { name: "DSA-1426", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2007/dsa-1426", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-09-03T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-15T20:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=192472", }, { name: "MDKSA-2007:183", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183", }, { name: "SUSE-SR:2007:019", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { name: "26868", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26868", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-1751", }, { name: "26811", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26811", }, { name: "oval:org.mitre.oval:def:11159", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159", }, { name: "27053", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27053", }, { name: "27996", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27996", }, { name: "27275", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27275", }, { name: "27382", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/27382", }, { name: "26857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119", }, { name: "26778", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26778", }, { tags: [ "x_refsource_MISC", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001", }, { name: "26882", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26882", }, { name: "26987", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26987", }, { name: "GLSA-200710-28", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200710-28.xml", }, { name: "ADV-2007-3144", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/3144", }, { name: "20070901-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc", }, { tags: [ "x_refsource_MISC", ], url: "http://dist.trolltech.com/developer/download/175791_4.diff", }, { name: "39384", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/39384", }, { name: "26804", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26804", }, { name: "26782", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/26782", }, { tags: [ "x_refsource_MISC", ], url: "http://dist.trolltech.com/developer/download/175791_3.diff", }, { name: "FEDORA-2007-703", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml", }, { name: "FEDORA-2007-2216", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml", }, { name: "GLSA-200712-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200712-08.xml", }, { name: "28021", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28021", }, { name: "RHSA-2007:0883", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html", }, { name: "1018688", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1018688", }, { name: "20071004 FLEA-2007-0059-1 qt qt-tools", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded", }, { name: "USN-513-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-513-1", }, { name: "25657", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/25657", }, { name: "DSA-1426", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2007/dsa-1426", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2007-4137", datePublished: "2007-09-18T19:00:00", dateReserved: "2007-08-02T00:00:00", dateUpdated: "2024-08-07T14:46:38.696Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1151 (GCVE-0-2004-1151)
Vulnerability from cvelistv5
Published
2004-12-08 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.
References
▼ | URL | Tags |
---|---|---|
http://linux.bkbits.net:8080/linux-2.6/cset%401.2079 | x_refsource_MISC | |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=110306397320336&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.novell.com/linux/security/advisories/2004_44_kernel.html | vendor-advisory, x_refsource_SUSE | |
http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ | x_refsource_MISC | |
http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:01.045Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ", }, { name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-01T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-10-17T13:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079", }, { name: "MDKSA-2005:022", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "SUSE-SA:2004:044", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { tags: [ "x_refsource_MISC", ], url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ", }, { name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1151", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://linux.bkbits.net:8080/linux-2.6/cset@1.2079", refsource: "MISC", url: "http://linux.bkbits.net:8080/linux-2.6/cset@1.2079", }, { name: "MDKSA-2005:022", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { name: "20041214 [USN-38-1] Linux kernel vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { name: "SUSE-SA:2004:044", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { name: "http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ", refsource: "MISC", url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch@41ae6af1cR3mJYlW6D8EHxCKSxuJiQ", }, { name: "[linux-kernel] 20041130 Buffer overrun in arch/x86_64/sys_ia32.c:sys32_ni_syscall()", refsource: "MLIST", url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1151", datePublished: "2004-12-08T05:00:00", dateReserved: "2004-12-07T00:00:00", dateUpdated: "2024-08-08T00:39:01.045Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2007-1352 (GCVE-0-2007-1352)
Vulnerability from cvelistv5
Published
2007-04-06 01:00
Modified
2024-08-07 12:50
Severity ?
EPSS score ?
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T12:50:35.267Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502", }, { name: "24745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24745", }, { name: "oval:org.mitre.oval:def:10523", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523", }, { name: "33937", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/33937", }, { name: "24771", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24771", }, { name: "24770", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24770", }, { name: "25006", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25006", }, { name: "24756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24756", }, { name: "23283", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23300", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "24758", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24758", }, { name: "1017857", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1017857", }, { name: "oval:org.mitre.oval:def:13243", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "DSA-1294", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24765", }, { name: "25216", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25216", }, { name: "xorg-fontsdir-bo(33419)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "102886", tags: [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata40.html#011_xorg", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "25004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25004", }, { name: "25305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25305", }, { name: "RHSA-2007:0132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/24772", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", "x_transferred", ], url: "http://www.openbsd.org/errata39.html#021_xorg", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-04-03T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502", }, { name: "24745", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24745", }, { name: "oval:org.mitre.oval:def:10523", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523", }, { name: "33937", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/33937", }, { name: "24771", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24771", }, { name: "24770", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24770", }, { name: "25006", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25006", }, { name: "24756", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24756", }, { name: "23283", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23300", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "24758", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24758", }, { name: "1017857", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1017857", }, { name: "oval:org.mitre.oval:def:13243", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25195", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "DSA-1294", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24765", }, { name: "25216", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25216", }, { name: "xorg-fontsdir-bo(33419)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "102886", tags: [ "vendor-advisory", "x_refsource_SUNALERT", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata40.html#011_xorg", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "25004", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25004", }, { name: "25305", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25305", }, { name: "RHSA-2007:0132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/24772", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", tags: [ "vendor-advisory", "x_refsource_OPENBSD", ], url: "http://www.openbsd.org/errata39.html#021_xorg", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2007-1352", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20070403 Multiple Vendor X Server fonts.dir File Parsing Integer Overflow Vulnerability", refsource: "IDEFENSE", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502", }, { name: "24745", refsource: "SECUNIA", url: "http://secunia.com/advisories/24745", }, { name: "oval:org.mitre.oval:def:10523", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523", }, { name: "33937", refsource: "SECUNIA", url: "http://secunia.com/advisories/33937", }, { name: "24771", refsource: "SECUNIA", url: "http://secunia.com/advisories/24771", }, { name: "24770", refsource: "SECUNIA", url: "http://secunia.com/advisories/24770", }, { name: "25006", refsource: "SECUNIA", url: "http://secunia.com/advisories/25006", }, { name: "24756", refsource: "SECUNIA", url: "http://secunia.com/advisories/24756", }, { name: "23283", refsource: "BID", url: "http://www.securityfocus.com/bid/23283", }, { name: "RHSA-2007:0126", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { name: "23300", refsource: "BID", url: "http://www.securityfocus.com/bid/23300", }, { name: "http://support.apple.com/kb/HT3438", refsource: "CONFIRM", url: "http://support.apple.com/kb/HT3438", }, { name: "GLSA-200705-10", refsource: "GENTOO", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { name: "USN-448-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-448-1", }, { name: "APPLE-SA-2009-02-12", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { name: "MDKSA-2007:080", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { name: "24758", refsource: "SECUNIA", url: "http://secunia.com/advisories/24758", }, { name: "1017857", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1017857", }, { name: "oval:org.mitre.oval:def:13243", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243", }, { name: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", refsource: "CONFIRM", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { name: "25195", refsource: "SECUNIA", url: "http://secunia.com/advisories/25195", }, { name: "RHSA-2007:0125", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { name: "24741", refsource: "SECUNIA", url: "http://secunia.com/advisories/24741", }, { name: "APPLE-SA-2007-11-14", refsource: "APPLE", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { name: "[xorg-announce] 20070403 various integer overflow vulnerabilites in xserver, libX11 and libXfont", refsource: "MLIST", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { name: "24791", refsource: "SECUNIA", url: "http://secunia.com/advisories/24791", }, { name: "SUSE-SA:2007:027", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { name: "DSA-1294", refsource: "DEBIAN", url: "http://www.debian.org/security/2007/dsa-1294", }, { name: "24765", refsource: "SECUNIA", url: "http://secunia.com/advisories/24765", }, { name: "25216", refsource: "SECUNIA", url: "http://secunia.com/advisories/25216", }, { name: "xorg-fontsdir-bo(33419)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419", }, { name: "20070404 rPSA-2007-0065-1 freetype xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { name: "20070405 FLEA-2007-0009-1: xorg-x11 freetype", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { name: "ADV-2007-1548", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1548", }, { name: "102886", refsource: "SUNALERT", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { name: "ADV-2007-1217", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1217", }, { name: "[4.0] 011: SECURITY FIX: April 4, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { name: "https://issues.rpath.com/browse/RPL-1213", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-1213", }, { name: "25004", refsource: "SECUNIA", url: "http://secunia.com/advisories/25004", }, { name: "25305", refsource: "SECUNIA", url: "http://secunia.com/advisories/25305", }, { name: "RHSA-2007:0132", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { name: "24772", refsource: "SECUNIA", url: "http://secunia.com/advisories/24772", }, { name: "[3.9] 021: SECURITY FIX: April 4, 2007", refsource: "OPENBSD", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { name: "http://issues.foresightlinux.org/browse/FL-223", refsource: "CONFIRM", url: "http://issues.foresightlinux.org/browse/FL-223", }, { name: "MDKSA-2007:079", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2007-1352", datePublished: "2007-04-06T01:00:00", dateReserved: "2007-03-08T00:00:00", dateUpdated: "2024-08-07T12:50:35.267Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2010-0834 (GCVE-0-2010-0834)
Vulnerability from cvelistv5
Published
2010-08-09 20:00
Modified
2024-09-16 22:24
Severity ?
EPSS score ?
Summary
The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/42280 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/40889 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/2015 | vdb-entry, x_refsource_VUPEN | |
http://www.ubuntu.com/usn/usn-968-1 | vendor-advisory, x_refsource_UBUNTU |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T00:59:39.338Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "42280", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/42280", }, { name: "40889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/40889", }, { name: "ADV-2010-2015", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/2015", }, { name: "USN-968-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-968-1", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2010-08-09T20:00:00Z", orgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", shortName: "canonical", }, references: [ { name: "42280", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/42280", }, { name: "40889", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/40889", }, { name: "ADV-2010-2015", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/2015", }, { name: "USN-968-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-968-1", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@ubuntu.com", ID: "CVE-2010-0834", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "42280", refsource: "BID", url: "http://www.securityfocus.com/bid/42280", }, { name: "40889", refsource: "SECUNIA", url: "http://secunia.com/advisories/40889", }, { name: "ADV-2010-2015", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/2015", }, { name: "USN-968-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-968-1", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "cc1ad9ee-3454-478d-9317-d3e869d708bc", assignerShortName: "canonical", cveId: "CVE-2010-0834", datePublished: "2010-08-09T20:00:00Z", dateReserved: "2010-03-03T00:00:00Z", dateUpdated: "2024-09-16T22:24:37.174Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1337 (GCVE-0-2004-1337)
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/18673 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=110384535113035&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.securityfocus.com/bid/12093 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:46:12.368Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "linux-security-module-gain-privileges(18673)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673", }, { name: "20041223 Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "12093", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12093", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-12-23T00:00:00", descriptions: [ { lang: "en", value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "linux-security-module-gain-privileges(18673)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673", }, { name: "20041223 Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2", }, { name: "CLA-2005:930", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "12093", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12093", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1337", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "linux-security-module-gain-privileges(18673)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673", }, { name: "20041223 Linux 2.6 Kernel Capability LSM Module Local Privilege Elevation", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2", }, { name: "CLA-2005:930", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { name: "12093", refsource: "BID", url: "http://www.securityfocus.com/bid/12093", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1337", datePublished: "2005-01-06T05:00:00", dateReserved: "2005-01-06T00:00:00", dateUpdated: "2024-08-08T00:46:12.368Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1007 (GCVE-0-2004-1007)
Vulnerability from cvelistv5
Published
2004-11-04 05:00
Modified
2024-08-08 00:38
Severity ?
EPSS score ?
Summary
The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.
References
▼ | URL | Tags |
---|---|---|
http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17916 | vdb-entry, x_refsource_XF |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:38:59.725Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", }, { name: "bogofilter-dos(17916)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-30T00:00:00", descriptions: [ { lang: "en", value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", }, { name: "bogofilter-dos(17916)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1007", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", refsource: "CONFIRM", url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", }, { name: "bogofilter-dos(17916)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1007", datePublished: "2004-11-04T05:00:00", dateReserved: "2004-11-03T00:00:00", dateUpdated: "2024-08-08T00:38:59.725Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0384 (GCVE-0-2005-0384)
Vulnerability from cvelistv5
Published
2005-03-18 05:00
Modified
2024-08-07 21:13
Severity ?
EPSS score ?
Summary
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:13:53.709Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20163", }, { name: "2005-0009", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2005/0009/", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "RHSA-2005:366", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { name: "12810", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12810", }, { name: "RHSA-2005:283", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { name: "SUSE-SA:2005:018", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "oval:org.mitre.oval:def:9562", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2005:284", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { name: "USN-95-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/95-1/", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20202", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/20338", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-03-15T00:00:00", descriptions: [ { lang: "en", value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-03T20:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { name: "20163", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20163", }, { name: "2005-0009", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2005/0009/", }, { name: "DSA-1082", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "RHSA-2005:366", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { name: "12810", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12810", }, { name: "RHSA-2005:283", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { name: "SUSE-SA:2005:018", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html", }, { name: "DSA-1070", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "DSA-1067", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "oval:org.mitre.oval:def:9562", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2005:284", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { name: "USN-95-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/95-1/", }, { name: "20202", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20202", }, { name: "20338", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/20338", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2005-0384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20163", refsource: "SECUNIA", url: "http://secunia.com/advisories/20163", }, { name: "2005-0009", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2005/0009/", }, { name: "DSA-1082", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1082", }, { name: "RHSA-2005:366", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { name: "12810", refsource: "BID", url: "http://www.securityfocus.com/bid/12810", }, { name: "RHSA-2005:283", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { name: "SUSE-SA:2005:018", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html", }, { name: "DSA-1070", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1070", }, { name: "DSA-1067", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1067", }, { name: "DSA-1069", refsource: "DEBIAN", url: "http://www.debian.org/security/2006/dsa-1069", }, { name: "FLSA:152532", refsource: "FEDORA", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "oval:org.mitre.oval:def:9562", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562", }, { name: "RHSA-2005:293", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2005:284", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { name: "USN-95-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/95-1/", }, { name: "20202", refsource: "SECUNIA", url: "http://secunia.com/advisories/20202", }, { name: "20338", refsource: "SECUNIA", url: "http://secunia.com/advisories/20338", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2005-0384", datePublished: "2005-03-18T05:00:00", dateReserved: "2005-02-14T00:00:00", dateUpdated: "2024-08-07T21:13:53.709Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0882 (GCVE-0-2004-0882)
Vulnerability from cvelistv5
Published
2004-11-19 05:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:47.947Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1012235", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1012235", }, { name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2", }, { name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2", }, { name: "samba-qfilepathinfo-bo(18070)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070", }, { name: "VU#457622", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/457622", }, { name: "CLA-2004:899", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899", }, { name: "13189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/13189", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://security.e-matters.de/advisories/132004.html", }, { name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2", }, { name: "oval:org.mitre.oval:def:9969", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969", }, { name: "APPLE-SA-2005-03-21", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", }, { name: "2004-0058", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.net/errata/2004/0058/", }, { name: "11782", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/11782", }, { name: "20041201-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", "x_transferred", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P", }, { name: "P-038", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred", ], url: "http://www.ciac.org/ciac/bulletins/p-038.shtml", }, { name: "SUSE-SA:2004:040", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html", }, { name: "SCOSA-2005.17", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-15T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1012235", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1012235", }, { name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2", }, { name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2", }, { name: "samba-qfilepathinfo-bo(18070)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070", }, { name: "VU#457622", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/457622", }, { name: "CLA-2004:899", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899", }, { name: "13189", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/13189", }, { tags: [ "x_refsource_MISC", ], url: "http://security.e-matters.de/advisories/132004.html", }, { name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2", }, { name: "oval:org.mitre.oval:def:9969", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969", }, { name: "APPLE-SA-2005-03-21", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", }, { name: "2004-0058", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.net/errata/2004/0058/", }, { name: "11782", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/11782", }, { name: "20041201-01-P", tags: [ "vendor-advisory", "x_refsource_SGI", ], url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P", }, { name: "P-038", tags: [ "third-party-advisory", "government-resource", "x_refsource_CIAC", ], url: "http://www.ciac.org/ciac/bulletins/p-038.shtml", }, { name: "SUSE-SA:2004:040", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html", }, { name: "SCOSA-2005.17", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0882", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1012235", refsource: "SECTRACK", url: "http://securitytracker.com/id?1012235", }, { name: "20041115 [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2", }, { name: "20041217 [OpenPKG-SA-2004.054] OpenPKG Security Advisory (samba)", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2", }, { name: "samba-qfilepathinfo-bo(18070)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070", }, { name: "VU#457622", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/457622", }, { name: "CLA-2004:899", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899", }, { name: "13189", refsource: "SECUNIA", url: "http://secunia.com/advisories/13189", }, { name: "http://security.e-matters.de/advisories/132004.html", refsource: "MISC", url: "http://security.e-matters.de/advisories/132004.html", }, { name: "20041115 Advisory 13/2004: Samba 3.x QFILEPATHINFO unicode filename buffer overflow", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2", }, { name: "oval:org.mitre.oval:def:9969", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969", }, { name: "APPLE-SA-2005-03-21", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", }, { name: "2004-0058", refsource: "TRUSTIX", url: "http://www.trustix.net/errata/2004/0058/", }, { name: "11782", refsource: "OSVDB", url: "http://www.osvdb.org/11782", }, { name: "20041201-01-P", refsource: "SGI", url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P", }, { name: "P-038", refsource: "CIAC", url: "http://www.ciac.org/ciac/bulletins/p-038.shtml", }, { name: "SUSE-SA:2004:040", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html", }, { name: "SCOSA-2005.17", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0882", datePublished: "2004-11-19T05:00:00", dateReserved: "2004-09-22T00:00:00", dateUpdated: "2024-08-08T00:31:47.947Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0750 (GCVE-0-2005-0750)
Vulnerability from cvelistv5
Published
2005-04-03 05:00
Modified
2024-08-07 21:21
Severity ?
EPSS score ?
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/19844 | vdb-entry, x_refsource_XF | |
http://www.redhat.com/support/errata/RHSA-2005-366.html | vendor-advisory, x_refsource_REDHAT | |
http://www.redhat.com/support/errata/RHSA-2005-283.html | vendor-advisory, x_refsource_REDHAT | |
http://marc.info/?l=bugtraq&m=111204562102633&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719 | vdb-entry, signature, x_refsource_OVAL | |
http://www.securityfocus.com/bid/12911 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532 | vendor-advisory, x_refsource_FEDORA | |
http://www.redhat.com/support/errata/RHSA-2005-293.html | vendor-advisory, x_refsource_REDHAT | |
http://www.redhat.com/support/errata/RHSA-2005-284.html | vendor-advisory, x_refsource_REDHAT | |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html | mailing-list, x_refsource_FULLDISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:21:06.748Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "kernel-bluezsockcreate-integer-underflow(19844)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844", }, { name: "RHSA-2005:366", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { name: "RHSA-2005:283", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2", }, { name: "oval:org.mitre.oval:def:11719", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719", }, { name: "12911", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12911", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2005:284", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-03-27T00:00:00", descriptions: [ { lang: "en", value: "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { name: "kernel-bluezsockcreate-integer-underflow(19844)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844", }, { name: "RHSA-2005:366", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { name: "RHSA-2005:283", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2", }, { name: "oval:org.mitre.oval:def:11719", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719", }, { name: "12911", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12911", }, { name: "FLSA:152532", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { name: "RHSA-2005:293", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { name: "RHSA-2005:284", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { name: "20050327 local root security bug in linux >= 2.4.6 <= 2.4.30-rc1 and 2.6.x.y <= 2.6.11.5", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html", }, ], }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2005-0750", datePublished: "2005-04-03T05:00:00", dateReserved: "2005-03-17T00:00:00", dateUpdated: "2024-08-07T21:21:06.748Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0918 (GCVE-0-2004-0918)
Vulnerability from cvelistv5
Published
2004-10-21 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:48.079Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "CLA-2005:923", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923", }, { name: "11385", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11385", }, { name: "SCOSA-2005.16", tags: [ "vendor-advisory", "x_refsource_SCO", "x_transferred", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt", }, { name: "RHSA-2004:591", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2004-591.html", }, { name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred", ], url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", }, { name: "oval:org.mitre.oval:def:10931", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931", }, { name: "ADV-2008-1969", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/1969/references", }, { name: "30967", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30967", }, { name: "FLSA-2006:152809", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "SUSE-SR:2008:014", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", }, { name: "FEDORA-2008-6045", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html", }, { name: "OpenPKG-SA-2004.048", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2", }, { name: "squid-snmp-asnparseheader-dos(17688)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688", }, { name: "30914", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/30914", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", }, { name: "GLSA-200410-15", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-11T00:00:00", descriptions: [ { lang: "en", value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "CLA-2005:923", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923", }, { name: "11385", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11385", }, { name: "SCOSA-2005.16", tags: [ "vendor-advisory", "x_refsource_SCO", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt", }, { name: "RHSA-2004:591", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2004-591.html", }, { name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability", tags: [ "third-party-advisory", "x_refsource_IDEFENSE", ], url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", }, { name: "oval:org.mitre.oval:def:10931", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931", }, { name: "ADV-2008-1969", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/1969/references", }, { name: "30967", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30967", }, { name: "FLSA-2006:152809", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "SUSE-SR:2008:014", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", }, { name: "FEDORA-2008-6045", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html", }, { name: "OpenPKG-SA-2004.048", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2", }, { name: "squid-snmp-asnparseheader-dos(17688)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688", }, { name: "30914", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/30914", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", }, { name: "GLSA-200410-15", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0918", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "CLA-2005:923", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923", }, { name: "11385", refsource: "BID", url: "http://www.securityfocus.com/bid/11385", }, { name: "SCOSA-2005.16", refsource: "SCO", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt", }, { name: "RHSA-2004:591", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2004-591.html", }, { name: "20041011 Squid Web Proxy Cache Remote Denial of Service Vulnerability", refsource: "IDEFENSE", url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false", }, { name: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", refsource: "CONFIRM", url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", }, { name: "oval:org.mitre.oval:def:10931", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931", }, { name: "ADV-2008-1969", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/1969/references", }, { name: "30967", refsource: "SECUNIA", url: "http://secunia.com/advisories/30967", }, { name: "FLSA-2006:152809", refsource: "FEDORA", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "SUSE-SR:2008:014", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", }, { name: "FEDORA-2008-6045", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html", }, { name: "OpenPKG-SA-2004.048", refsource: "OPENPKG", url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2", }, { name: "squid-snmp-asnparseheader-dos(17688)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688", }, { name: "30914", refsource: "SECUNIA", url: "http://secunia.com/advisories/30914", }, { name: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", refsource: "CONFIRM", url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", }, { name: "GLSA-200410-15", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0918", datePublished: "2004-10-21T04:00:00", dateReserved: "2004-09-27T00:00:00", dateUpdated: "2024-08-08T00:31:48.079Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-1051 (GCVE-0-2004-1051)
Vulnerability from cvelistv5
Published
2004-11-18 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
References
▼ | URL | Tags |
---|---|---|
https://www.ubuntu.com/usn/usn-28-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://www.sudo.ws/sudo/alerts/bash_functions.html | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=110598298225675&w=2 | vendor-advisory, x_refsource_OPENPKG | |
http://marc.info/?l=bugtraq&m=110028877431192&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:133 | vendor-advisory, x_refsource_MANDRAKE | |
http://lists.apple.com/archives/security-announce/2005/May/msg00001.html | vendor-advisory, x_refsource_APPLE | |
http://www.securityfocus.com/bid/11668 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2004/dsa-596 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18055 | vdb-entry, x_refsource_XF | |
http://www.trustix.org/errata/2004/0061/ | vendor-advisory, x_refsource_TRUSTIX |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:39:00.761Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-28-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://www.ubuntu.com/usn/usn-28-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.sudo.ws/sudo/alerts/bash_functions.html", }, { name: "OpenPKG-SA-2005.002", tags: [ "vendor-advisory", "x_refsource_OPENPKG", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2", }, { name: "20041112 Sudo version 1.6.8p2 now available (fwd)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2", }, { name: "MDKSA-2004:133", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133", }, { name: "APPLE-SA-2005-05-03", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html", }, { name: "11668", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/11668", }, { name: "DSA-596", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2004/dsa-596", }, { name: "sudo-bash-command-execution(18055)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055", }, { name: "2004-0061", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2004/0061/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-11-12T00:00:00", descriptions: [ { lang: "en", value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-28-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://www.ubuntu.com/usn/usn-28-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.sudo.ws/sudo/alerts/bash_functions.html", }, { name: "OpenPKG-SA-2005.002", tags: [ "vendor-advisory", "x_refsource_OPENPKG", ], url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2", }, { name: "20041112 Sudo version 1.6.8p2 now available (fwd)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2", }, { name: "MDKSA-2004:133", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133", }, { name: "APPLE-SA-2005-05-03", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html", }, { name: "11668", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/11668", }, { name: "DSA-596", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2004/dsa-596", }, { name: "sudo-bash-command-execution(18055)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055", }, { name: "2004-0061", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2004/0061/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-1051", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-28-1", refsource: "UBUNTU", url: "https://www.ubuntu.com/usn/usn-28-1/", }, { name: "http://www.sudo.ws/sudo/alerts/bash_functions.html", refsource: "CONFIRM", url: "http://www.sudo.ws/sudo/alerts/bash_functions.html", }, { name: "OpenPKG-SA-2005.002", refsource: "OPENPKG", url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2", }, { name: "20041112 Sudo version 1.6.8p2 now available (fwd)", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2", }, { name: "MDKSA-2004:133", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133", }, { name: "APPLE-SA-2005-05-03", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html", }, { name: "11668", refsource: "BID", url: "http://www.securityfocus.com/bid/11668", }, { name: "DSA-596", refsource: "DEBIAN", url: "http://www.debian.org/security/2004/dsa-596", }, { name: "sudo-bash-command-execution(18055)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055", }, { name: "2004-0061", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2004/0061/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-1051", datePublished: "2004-11-18T05:00:00", dateReserved: "2004-11-17T00:00:00", dateUpdated: "2024-08-08T00:39:00.761Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2005-0156 (GCVE-0-2005-0156)
Vulnerability from cvelistv5
Published
2005-02-07 05:00
Modified
2024-08-07 21:05
Severity ?
EPSS score ?
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T21:05:24.911Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt", }, { name: "12426", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/12426", }, { name: "RHSA-2005:105", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-105.html", }, { name: "14120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/14120", }, { name: "2005-0003", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.org/errata/2005/0003/", }, { name: "RHSA-2005:103", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2005-103.html", }, { name: "oval:org.mitre.oval:def:10803", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", }, { name: "55314", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/55314", }, { name: "20050202 [USN-72-1] Perl vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2", }, { name: "CLSA-2006:1056", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", }, { name: "FLSA-2006:152845", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "MDKSA-2005:031", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", }, { name: "perl-perliodebug-bo(19208)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", }, { name: "GLSA-200502-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2005-02-02T00:00:00", descriptions: [ { lang: "en", value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-10-10T00:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt", }, { name: "12426", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/12426", }, { name: "RHSA-2005:105", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-105.html", }, { name: "14120", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/14120", }, { name: "2005-0003", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.org/errata/2005/0003/", }, { name: "RHSA-2005:103", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2005-103.html", }, { name: "oval:org.mitre.oval:def:10803", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", }, { name: "55314", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/55314", }, { name: "20050202 [USN-72-1] Perl vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2", }, { name: "CLSA-2006:1056", tags: [ "vendor-advisory", "x_refsource_CONECTIVA", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", }, { name: "FLSA-2006:152845", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "MDKSA-2005:031", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", }, { name: "perl-perliodebug-bo(19208)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", }, { name: "GLSA-200502-13", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2005-0156", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20050207 DMA[2005-0131b] - 'Setuid Perl PERLIO_DEBUG", refsource: "FULLDISC", url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", }, { name: "http://www.digitalmunition.com/DMA[2005-0131b].txt", refsource: "MISC", url: "http://www.digitalmunition.com/DMA[2005-0131b].txt", }, { name: "12426", refsource: "BID", url: "http://www.securityfocus.com/bid/12426", }, { name: "RHSA-2005:105", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-105.html", }, { name: "14120", refsource: "SECUNIA", url: "http://secunia.com/advisories/14120", }, { name: "2005-0003", refsource: "TRUSTIX", url: "http://www.trustix.org/errata/2005/0003/", }, { name: "RHSA-2005:103", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2005-103.html", }, { name: "oval:org.mitre.oval:def:10803", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", }, { name: "55314", refsource: "SECUNIA", url: "http://secunia.com/advisories/55314", }, { name: "20050202 [USN-72-1] Perl vulnerabilities", refsource: "BUGTRAQ", url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2", }, { name: "CLSA-2006:1056", refsource: "CONECTIVA", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", }, { name: "FLSA-2006:152845", refsource: "FEDORA", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { name: "MDKSA-2005:031", refsource: "MANDRAKE", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", }, { name: "perl-perliodebug-bo(19208)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", }, { name: "GLSA-200502-13", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2005-0156", datePublished: "2005-02-07T05:00:00", dateReserved: "2005-01-27T00:00:00", dateUpdated: "2024-08-07T21:05:24.911Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2008-0172 (GCVE-0-2008-0172)
Vulnerability from cvelistv5
Published
2008-01-17 22:00
Modified
2024-08-07 07:39
Severity ?
EPSS score ?
Summary
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T07:39:32.901Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", }, { name: "48099", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/48099", }, { name: "ADV-2008-0249", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2008/0249", }, { name: "27325", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/27325", }, { name: "28860", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28860", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svn.boost.org/trac/boost/changeset/42745", }, { name: "28943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28943", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://svn.boost.org/trac/boost/changeset/42674", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://issues.rpath.com/browse/RPL-2143", }, { name: "FEDORA-2008-0880", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html", }, { name: "28511", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28511", }, { name: "20080213 rPSA-2008-0063-1 boost", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded", }, { name: "28705", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28705", }, { name: "28545", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28545", }, { name: "SUSE-SR:2008:006", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html", }, { name: "GLSA-200802-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml", }, { name: "28527", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/28527", }, { name: "USN-570-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/usn-570-1", }, { name: "29323", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/29323", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=205955", }, { name: "MDVSA-2008:032", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2008-01-11T00:00:00", descriptions: [ { lang: "en", value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-15T20:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", }, { name: "48099", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/48099", }, { name: "ADV-2008-0249", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2008/0249", }, { name: "27325", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/27325", }, { name: "28860", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28860", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svn.boost.org/trac/boost/changeset/42745", }, { name: "28943", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28943", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://svn.boost.org/trac/boost/changeset/42674", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://issues.rpath.com/browse/RPL-2143", }, { name: "FEDORA-2008-0880", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html", }, { name: "28511", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28511", }, { name: "20080213 rPSA-2008-0063-1 boost", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded", }, { name: "28705", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28705", }, { name: "28545", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28545", }, { name: "SUSE-SR:2008:006", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html", }, { name: "GLSA-200802-08", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml", }, { name: "28527", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/28527", }, { name: "USN-570-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/usn-570-1", }, { name: "29323", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/29323", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.gentoo.org/show_bug.cgi?id=205955", }, { name: "MDVSA-2008:032", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2008-0172", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", refsource: "CONFIRM", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", }, { name: "48099", refsource: "SECUNIA", url: "http://secunia.com/advisories/48099", }, { name: "ADV-2008-0249", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2008/0249", }, { name: "27325", refsource: "BID", url: "http://www.securityfocus.com/bid/27325", }, { name: "28860", refsource: "SECUNIA", url: "http://secunia.com/advisories/28860", }, { name: "http://svn.boost.org/trac/boost/changeset/42745", refsource: "CONFIRM", url: "http://svn.boost.org/trac/boost/changeset/42745", }, { name: "28943", refsource: "SECUNIA", url: "http://secunia.com/advisories/28943", }, { name: "http://svn.boost.org/trac/boost/changeset/42674", refsource: "CONFIRM", url: "http://svn.boost.org/trac/boost/changeset/42674", }, { name: "https://issues.rpath.com/browse/RPL-2143", refsource: "CONFIRM", url: "https://issues.rpath.com/browse/RPL-2143", }, { name: "FEDORA-2008-0880", refsource: "FEDORA", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html", }, { name: "28511", refsource: "SECUNIA", url: "http://secunia.com/advisories/28511", }, { name: "20080213 rPSA-2008-0063-1 boost", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded", }, { name: "28705", refsource: "SECUNIA", url: "http://secunia.com/advisories/28705", }, { name: "28545", refsource: "SECUNIA", url: "http://secunia.com/advisories/28545", }, { name: "SUSE-SR:2008:006", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html", }, { name: "GLSA-200802-08", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml", }, { name: "28527", refsource: "SECUNIA", url: "http://secunia.com/advisories/28527", }, { name: "USN-570-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/usn-570-1", }, { name: "29323", refsource: "SECUNIA", url: "http://secunia.com/advisories/29323", }, { name: "http://bugs.gentoo.org/show_bug.cgi?id=205955", refsource: "CONFIRM", url: "http://bugs.gentoo.org/show_bug.cgi?id=205955", }, { name: "MDVSA-2008:032", refsource: "MANDRIVA", url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2008-0172", datePublished: "2008-01-17T22:00:00", dateReserved: "2008-01-09T00:00:00", dateUpdated: "2024-08-07T07:39:32.901Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2004-0956 (GCVE-0-2004-0956)
Vulnerability from cvelistv5
Published
2004-12-05 05:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
References
▼ | URL | Tags |
---|---|---|
http://www.trustix.net/errata/2004/0054/ | vendor-advisory, x_refsource_TRUSTIX | |
http://lists.mysql.com/packagers/202 | x_refsource_CONFIRM | |
http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17768 | vdb-entry, x_refsource_XF | |
http://www.novell.com/linux/security/advisories/2004_01_sr.html | vendor-advisory, x_refsource_SUSE | |
http://bugs.mysql.com/bug.php?id=3870 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T00:31:48.208Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "2004-0054", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred", ], url: "http://www.trustix.net/errata/2004/0054/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://lists.mysql.com/packagers/202", }, { name: "GLSA-200410-22", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml", }, { name: "mysql-match-against-dos(17768)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768", }, { name: "SUSE-SR:2004:001", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://bugs.mysql.com/bug.php?id=3870", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2004-10-24T00:00:00", descriptions: [ { lang: "en", value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-07-10T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "2004-0054", tags: [ "vendor-advisory", "x_refsource_TRUSTIX", ], url: "http://www.trustix.net/errata/2004/0054/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://lists.mysql.com/packagers/202", }, { name: "GLSA-200410-22", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml", }, { name: "mysql-match-against-dos(17768)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768", }, { name: "SUSE-SR:2004:001", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://bugs.mysql.com/bug.php?id=3870", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2004-0956", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "2004-0054", refsource: "TRUSTIX", url: "http://www.trustix.net/errata/2004/0054/", }, { name: "http://lists.mysql.com/packagers/202", refsource: "CONFIRM", url: "http://lists.mysql.com/packagers/202", }, { name: "GLSA-200410-22", refsource: "GENTOO", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml", }, { name: "mysql-match-against-dos(17768)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768", }, { name: "SUSE-SR:2004:001", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html", }, { name: "http://bugs.mysql.com/bug.php?id=3870", refsource: "CONFIRM", url: "http://bugs.mysql.com/bug.php?id=3870", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2004-0956", datePublished: "2004-12-05T05:00:00", dateReserved: "2004-10-13T00:00:00", dateUpdated: "2024-08-08T00:31:48.208Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openpkg | openpkg | 2.1 | |
openpkg | openpkg | 2.2 | |
openpkg | openpkg | current | |
php | php | 3.0 | |
php | php | 3.0.1 | |
php | php | 3.0.2 | |
php | php | 3.0.3 | |
php | php | 3.0.4 | |
php | php | 3.0.5 | |
php | php | 3.0.6 | |
php | php | 3.0.7 | |
php | php | 3.0.8 | |
php | php | 3.0.9 | |
php | php | 3.0.10 | |
php | php | 3.0.11 | |
php | php | 3.0.12 | |
php | php | 3.0.13 | |
php | php | 3.0.14 | |
php | php | 3.0.15 | |
php | php | 3.0.16 | |
php | php | 3.0.17 | |
php | php | 3.0.18 | |
php | php | 4.0 | |
php | php | 4.0.1 | |
php | php | 4.0.1 | |
php | php | 4.0.1 | |
php | php | 4.0.2 | |
php | php | 4.0.3 | |
php | php | 4.0.3 | |
php | php | 4.0.4 | |
php | php | 4.0.5 | |
php | php | 4.0.6 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.1.0 | |
php | php | 4.1.1 | |
php | php | 4.1.2 | |
php | php | 4.2 | |
php | php | 4.2.0 | |
php | php | 4.2.1 | |
php | php | 4.2.2 | |
php | php | 4.2.3 | |
php | php | 4.3.0 | |
php | php | 4.3.1 | |
php | php | 4.3.2 | |
php | php | 4.3.3 | |
php | php | 4.3.4 | |
php | php | 4.3.5 | |
php | php | 4.3.6 | |
php | php | 4.3.7 | |
php | php | 4.3.8 | |
php | php | 4.3.9 | |
php | php | 5.0 | |
php | php | 5.0 | |
php | php | 5.0 | |
php | php | 5.0.0 | |
php | php | 5.0.1 | |
php | php | 5.0.2 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", matchCriteriaId: "245C601D-0FE7-47E3-8304-6FF45E9567D6", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "691BB8BB-329A-4640-B758-7590C99B5E42", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "E2BC4CCE-2774-463E-82EA-36CD442D3A7B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "C478024C-2FCD-463F-A75E-E04660AA9DF1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", matchCriteriaId: "1851ADE5-C70C-46E0-941A-6ADF7DB5C126", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", matchCriteriaId: "69DA3BA2-AF53-4C9D-93FA-0317841595B1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", matchCriteriaId: "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", matchCriteriaId: "67B59D6A-7EDA-4C34-81D6-C2557C85D164", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", matchCriteriaId: "AEBA40B6-8FDF-41AA-8166-F491FF7F3118", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", matchCriteriaId: "E74E2B72-A428-4BB3-B6F8-0AF5E487A807", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", matchCriteriaId: "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", matchCriteriaId: "945FF149-3446-4905-BCA1-C397E3497B58", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", matchCriteriaId: "8E446DBD-FEFA-4D22-9C9D-51F61C01E414", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", matchCriteriaId: "3C8DE728-78E1-4F9F-BC56-CD9B10E61287", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", matchCriteriaId: "80E31CC6-9356-4BB7-9F49-320AAF341E1E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", matchCriteriaId: "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", matchCriteriaId: "4B3E7199-8FB7-4930-9C0A-A36A698940B3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*", matchCriteriaId: "EDBEC461-D553-41B7-8D85-20B6A933C21C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "78BAA18C-E5A0-4210-B64B-709BBFF31EEC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*", matchCriteriaId: "419867C6-37BE-43B4-BFE0-6325FEE3807D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*", matchCriteriaId: "37896E87-95C2-4039-8362-BC03B1C56706", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "13A159B4-B847-47DE-B7F8-89384E6C551B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "57B59616-A309-40B4-94B1-50A7BC00E35C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*", matchCriteriaId: "8667FBC6-04B6-40E5-93B3-6C22BEED4B26", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "0F39A1B1-416E-4436-8007-733B66904A14", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "FC2E5F96-66D2-4F99-A74D-6A2305EE218E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "2D724D09-0D45-4701-93C9-348301217C8C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*", matchCriteriaId: "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*", matchCriteriaId: "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*", matchCriteriaId: "6E36203C-1392-49BB-AE7E-49626963D673", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6713614A-B14E-4A85-BF89-ED780068FC68", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FD95F8EB-B428-4B3C-9254-A5DECE03A989", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "069EB7EE-06B9-454F-9007-8DE5DCA33C53", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*", matchCriteriaId: "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", matchCriteriaId: "18BF5BE6-09EA-45AD-93BF-2BEF1742534E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", matchCriteriaId: "EC1460DF-1687-4314-BF1A-01290B20302D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", matchCriteriaId: "470380B0-3982-48FC-871B-C8B43C81900D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", matchCriteriaId: "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", matchCriteriaId: "63190D9B-7958-4B93-87C6-E7D5A572F6DC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", matchCriteriaId: "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", matchCriteriaId: "4AAF4586-74FF-47C6-864B-656FDF3F33D0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", matchCriteriaId: "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", matchCriteriaId: "5245F990-B4A7-4ED8-909D-B8137CE79FAA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", matchCriteriaId: "5652D5B0-68E4-4239-B9B7-599AFCF4C53E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", matchCriteriaId: "57B71BB7-5239-4860-9100-8CABC3992D8C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", matchCriteriaId: "72BD447A-4EED-482C-8F61-48FAD4FCF8BA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", matchCriteriaId: "B3F9DF9D-15E5-4387-ABE3-A7583331A928", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", matchCriteriaId: "11579E5C-D7CF-46EE-B015-5F4185C174E7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*", matchCriteriaId: "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*", matchCriteriaId: "E3797AB5-9E49-4251-A212-B6E5D9996764", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*", matchCriteriaId: "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7007E77F-60EF-44D8-9676-15B59DF1325F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "74E7AE59-1CB0-4300-BBE0-109F909789EF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger \"information disclosure, double-free and negative reference index array underflow\" results.", }, { lang: "es", value: "El código de deserialización en PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos causar una denegación de servicio y ejecutar código de su elección mediante datos \"no de confianza\" a la función unserialize que pueden producir resultados de \"revelación de información, liberación de memoria doble y referencia a índice de arrray negativo\"", }, ], id: "CVE-2004-1019", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2", }, { source: "cve@mitre.org", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { source: "cve@mitre.org", url: "http://www.hardened-php.net/advisories/012004.txt", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "cve@mitre.org", url: "http://www.php.net/release_4_3_10.php", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-816.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/advisories/9028", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00029.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2015-02/msg00079.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110314318531298&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.hardened-php.net/advisories/012004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.php.net/release_4_3_10.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-816.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/advisories/9028", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18514", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10511", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openpkg | openpkg | 2.1 | |
openpkg | openpkg | 2.2 | |
openpkg | openpkg | current | |
php | php | 3.0 | |
php | php | 3.0.1 | |
php | php | 3.0.2 | |
php | php | 3.0.3 | |
php | php | 3.0.4 | |
php | php | 3.0.5 | |
php | php | 3.0.6 | |
php | php | 3.0.7 | |
php | php | 3.0.8 | |
php | php | 3.0.9 | |
php | php | 3.0.10 | |
php | php | 3.0.11 | |
php | php | 3.0.12 | |
php | php | 3.0.13 | |
php | php | 3.0.14 | |
php | php | 3.0.15 | |
php | php | 3.0.16 | |
php | php | 3.0.17 | |
php | php | 3.0.18 | |
php | php | 4.0 | |
php | php | 4.0.1 | |
php | php | 4.0.1 | |
php | php | 4.0.1 | |
php | php | 4.0.2 | |
php | php | 4.0.3 | |
php | php | 4.0.3 | |
php | php | 4.0.4 | |
php | php | 4.0.5 | |
php | php | 4.0.6 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.0.7 | |
php | php | 4.1.0 | |
php | php | 4.1.1 | |
php | php | 4.1.2 | |
php | php | 4.2 | |
php | php | 4.2.0 | |
php | php | 4.2.1 | |
php | php | 4.2.2 | |
php | php | 4.2.3 | |
php | php | 4.3.0 | |
php | php | 4.3.1 | |
php | php | 4.3.2 | |
php | php | 4.3.3 | |
php | php | 4.3.4 | |
php | php | 4.3.5 | |
php | php | 4.3.6 | |
php | php | 4.3.7 | |
php | php | 4.3.8 | |
php | php | 4.3.9 | |
php | php | 5.0 | |
php | php | 5.0 | |
php | php | 5.0 | |
php | php | 5.0.0 | |
php | php | 5.0.1 | |
php | php | 5.0.2 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*", matchCriteriaId: "245C601D-0FE7-47E3-8304-6FF45E9567D6", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "691BB8BB-329A-4640-B758-7590C99B5E42", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "E2BC4CCE-2774-463E-82EA-36CD442D3A7B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "C478024C-2FCD-463F-A75E-E04660AA9DF1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "A5BD99C0-E875-496E-BE5E-A8DCBD414B5C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*", matchCriteriaId: "1851ADE5-C70C-46E0-941A-6ADF7DB5C126", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*", matchCriteriaId: "69DA3BA2-AF53-4C9D-93FA-0317841595B1", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*", matchCriteriaId: "FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*", matchCriteriaId: "67B59D6A-7EDA-4C34-81D6-C2557C85D164", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*", matchCriteriaId: "AEBA40B6-8FDF-41AA-8166-F491FF7F3118", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*", matchCriteriaId: "E74E2B72-A428-4BB3-B6F8-0AF5E487A807", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*", matchCriteriaId: "1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*", matchCriteriaId: "945FF149-3446-4905-BCA1-C397E3497B58", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*", matchCriteriaId: "8E446DBD-FEFA-4D22-9C9D-51F61C01E414", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*", matchCriteriaId: "3C8DE728-78E1-4F9F-BC56-CD9B10E61287", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*", matchCriteriaId: "80E31CC6-9356-4BB7-9F49-320AAF341E1E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*", matchCriteriaId: "1BB8AD3A-9181-459A-9AF2-B3FC6BAF6FEC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*", matchCriteriaId: "4B3E7199-8FB7-4930-9C0A-A36A698940B3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*", matchCriteriaId: "EDBEC461-D553-41B7-8D85-20B6A933C21C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "78BAA18C-E5A0-4210-B64B-709BBFF31EEC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*", matchCriteriaId: "419867C6-37BE-43B4-BFE0-6325FEE3807D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*", matchCriteriaId: "37896E87-95C2-4039-8362-BC03B1C56706", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "13A159B4-B847-47DE-B7F8-89384E6C551B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "57B59616-A309-40B4-94B1-50A7BC00E35C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*", matchCriteriaId: "8667FBC6-04B6-40E5-93B3-6C22BEED4B26", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "0F39A1B1-416E-4436-8007-733B66904A14", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "DD5FC218-3DDB-4981-81C9-6C69F8DA6F4D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "FC2E5F96-66D2-4F99-A74D-6A2305EE218E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "2D724D09-0D45-4701-93C9-348301217C8C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*", matchCriteriaId: "FC6A6F47-5C7C-4F82-B23B-9C959C69B27F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*", matchCriteriaId: "AE1A4DA6-6181-43A8-B0D8-5A016C3E75FF", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*", matchCriteriaId: "6E36203C-1392-49BB-AE7E-49626963D673", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*", matchCriteriaId: "6713614A-B14E-4A85-BF89-ED780068FC68", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FD95F8EB-B428-4B3C-9254-A5DECE03A989", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*", matchCriteriaId: "069EB7EE-06B9-454F-9007-8DE5DCA33C53", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*", matchCriteriaId: "BBA861A2-F0CD-4DBB-B43A-4970EB114DA5", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*", matchCriteriaId: "18BF5BE6-09EA-45AD-93BF-2BEF1742534E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*", matchCriteriaId: "EC1460DF-1687-4314-BF1A-01290B20302D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*", matchCriteriaId: "470380B0-3982-48FC-871B-C8B43C81900D", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*", matchCriteriaId: "9FAA7712-10F0-4BB6-BAFB-D0806AFD9DE2", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*", matchCriteriaId: "63190D9B-7958-4B93-87C6-E7D5A572F6DC", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*", matchCriteriaId: "7AB2E2E8-81D6-4973-AC0F-AA644EE99DD3", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*", matchCriteriaId: "4AAF4586-74FF-47C6-864B-656FDF3F33D0", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*", matchCriteriaId: "B14EF0C7-61F2-47A4-B7F8-43FF03C62DCA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*", matchCriteriaId: "5245F990-B4A7-4ED8-909D-B8137CE79FAA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*", matchCriteriaId: "5652D5B0-68E4-4239-B9B7-599AFCF4C53E", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*", matchCriteriaId: "57B71BB7-5239-4860-9100-8CABC3992D8C", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*", matchCriteriaId: "72BD447A-4EED-482C-8F61-48FAD4FCF8BA", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*", matchCriteriaId: "B3F9DF9D-15E5-4387-ABE3-A7583331A928", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*", matchCriteriaId: "11579E5C-D7CF-46EE-B015-5F4185C174E7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*", matchCriteriaId: "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*", matchCriteriaId: "E3797AB5-9E49-4251-A212-B6E5D9996764", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*", matchCriteriaId: "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", matchCriteriaId: "7007E77F-60EF-44D8-9676-15B59DF1325F", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", matchCriteriaId: "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B", vulnerable: true, }, { criteria: "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", matchCriteriaId: "74E7AE59-1CB0-4300-BBE0-109F909789EF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.", }, { lang: "es", value: "Desbordamiento de búfer en la función exif_read_data de PHP anteriores a 4.3.10 y PHP 5.x hasta 5.0.2 permite a atacantes remotos ejecutar código arbitrario mediante un nombre de sección largo en un fichero de imagen.", }, ], id: "CVE-2004-1065", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { source: "cve@mitre.org", url: "http://www.php.net/release_4_3_10.php", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/advisories/9028", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://msgs.securepoint.com/cgi-bin/get/bugtraq0412/157.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:151", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2005_02_php4_mod_php4.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.php.net/release_4_3_10.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-687.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-032.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/advisories/9028", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2344", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18517", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10877", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-03-05 02:30
Modified
2025-04-09 00:30
Severity ?
Summary
GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 8.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*", matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.", }, { lang: "es", value: "network-manager-applet en Ubuntu 8.10 no verifica adecuadamente los privilegios para las peticiones dbus(1) \"modify\" y (2) \"delete\", lo que permite a usuarios locales modificar o eliminar las conexiones de red de usuarios de su elección a través de vectores no especificados.", }, ], id: "CVE-2009-0578", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 6.2, confidentialityImpact: "NONE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:S/C:N/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.1, impactScore: 9.2, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2009-03-05T02:30:00.343", references: [ { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/34067", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/34473", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/33966", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id?1021909", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { source: "secalert@redhat.com", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34473", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/33966", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1021909", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-12-14 00:28
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*", matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Unspecified vulnerability in the \"alignment check exception handling\" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.", }, { lang: "es", value: "Vulnerabilidad sin especificar en el \"manejador de excepciones del check de alineamiento\" en el Ubuntu 5.10, 6.06 LTS, y 6.10 para el PowerPC (PPC) permite a usuarios locales provocar una denegación de servicio (kernel panic) mediante vectores sin especificar.", }, ], id: "CVE-2006-5649", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 4.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.1, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2006-12-14T00:28:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/23361", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23370", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23384", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23395", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23474", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/21523", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, { source: "cve@mitre.org", url: "http://www.us.debian.org/security/2006/dsa-1233", }, { source: "cve@mitre.org", url: "http://www.us.debian.org/security/2006/dsa-1237", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23370", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23395", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23474", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/21523", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.us.debian.org/security/2006/dsa-1233", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.us.debian.org/security/2006/dsa-1237", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Not vulnerable. This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, or 5. Red Hat Enterprise Linux 2.1 did not ship for PowerPC architecture.", lastModified: "2007-06-10T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | mailman | 2.1.5 | |
ubuntu | ubuntu_linux | 4.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:mailman:2.1.5:*:*:*:*:*:*:*", matchCriteriaId: "45C53260-503F-4934-B1FE-9FACD8E0EE66", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 55_options_traceback.dpatch patch for mailman 2.1.5 in Ubuntu 4.10 displays a different error message depending on whether the e-mail address is subscribed to a private list, which allows remote attackers to determine the list membership for a given e-mail address.", }, ], id: "CVE-2005-0080", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-05-02T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2", }, { source: "cve@mitre.org", url: "http://qa.debian.org/bts-security.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=285839", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110549296126351&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://qa.debian.org/bts-security.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-07-18 15:37
Modified
2025-04-03 01:03
Severity ?
Summary
passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the "Go Back" option after the final "Installation complete" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/21022 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/27091 | ||
cve@mitre.org | http://www.ubuntu.com/usn/usn-316-1 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21022 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/27091 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-316-1 | Exploit, Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 6.06_lts |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "passwd before 1:4.0.13 on Ubuntu 6.06 LTS leaves the root password blank instead of locking it when the administrator selects the \"Go Back\" option after the final \"Installation complete\" message and uses the main menu, which causes the password to be zeroed out in the installer's memory.", }, { lang: "es", value: "passwd anterior a 1:4.0.13 sobre Ubuntu 6.06 LTS deja la contraseña de root en blanco en vez de cerrarlo cuando el administrador selecciona la opción \"Go Back\" después del mensaje final \"instalación completa\" y utiliza el menu principal, lo que provoca que la contraseña que se ponga a cero fuera de la memoria del instalador.", }, ], id: "CVE-2006-3597", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-07-18T15:37:00.000", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/21022", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/27091", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", ], url: "http://www.ubuntu.com/usn/usn-316-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/21022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/27091", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "http://www.ubuntu.com/usn/usn-316-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | groff | 1.19 | |
gentoo | linux | * | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:groff:1.19:*:*:*:*:*:*:*", matchCriteriaId: "3C3A17D1-F3A9-45FC-A943-C47B8121599C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The groffer script in the Groff package 1.18 and later versions, as used in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], id: "CVE-2004-0969", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-02-09T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18764", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11287", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2004/0050", }, { source: "cve@mitre.org", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18764", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200411-15.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11287", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2004/0050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:038", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
yukihiro_matsumoto | ruby | 1.6 | |
yukihiro_matsumoto | ruby | 1.6.7 | |
yukihiro_matsumoto | ruby | 1.8 | |
yukihiro_matsumoto | ruby | 1.8.1 | |
yukihiro_matsumoto | ruby | 1.8.2_pre1 | |
yukihiro_matsumoto | ruby | 1.8.2_pre2 | |
gentoo | linux | * | |
mandrakesoft | mandrake_linux | 9.2 | |
mandrakesoft | mandrake_linux | 9.2 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.1 | |
mandrakesoft | mandrake_linux | 10.1 | |
mandrakesoft | mandrake_linux_corporate_server | 2.1 | |
mandrakesoft | mandrake_linux_corporate_server | 2.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.6:*:*:*:*:*:*:*", matchCriteriaId: "46EE9BA9-DE82-4461-8D05-8B4DA2BAFE19", vulnerable: true, }, { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.6.7:*:*:*:*:*:*:*", matchCriteriaId: "D9313467-150B-4231-80E5-35EFD6B64978", vulnerable: true, }, { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8:*:*:*:*:*:*:*", matchCriteriaId: "05A4185F-1CE1-48D1-B967-01A96527417B", vulnerable: true, }, { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.1:*:*:*:*:*:*:*", matchCriteriaId: "551CCA30-00E2-46CF-A05B-FA8F9827CDF4", vulnerable: true, }, { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre1:*:*:*:*:*:*:*", matchCriteriaId: "8AF152DC-D5B5-4692-AA7F-38357A2C48B3", vulnerable: true, }, { criteria: "cpe:2.3:a:yukihiro_matsumoto:ruby:1.8.2_pre2:*:*:*:*:*:*:*", matchCriteriaId: "724A539F-F54A-4896-9116-89D35350670D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.", }, ], id: "CVE-2004-0983", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-01T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-586", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-635.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11618", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/20-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-586", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:128", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-635.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11618", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17985", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10268", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/20-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295", vulnerable: true, }, { criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D", vulnerable: true, }, { criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6", vulnerable: true, }, { criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference.", }, ], id: "CVE-2005-3626", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-12-31T05:00:00.000", references: [ { source: "secalert@redhat.com", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18147", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18334", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18335", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18373", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18380", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18414", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18425", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18428", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18436", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18463", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18908", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18913", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19230", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19377", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25729", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2006/dsa-962", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "secalert@redhat.com", url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "secalert@redhat.com", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", }, { source: "secalert@redhat.com", url: "https://usn.ubuntu.com/236-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18334", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18335", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18373", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18380", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18414", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18425", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18428", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18436", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18463", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18908", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18913", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19230", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19377", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25729", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-962", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24026", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/236-1/", }, ], sourceIdentifier: "secalert@redhat.com", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-03-05 02:30
Modified
2025-04-09 00:30
Severity ?
Summary
nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 6.06 | |
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 8.04 | |
ubuntu | ubuntu_linux | 8.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:-:lts:*:*:*:*:*", matchCriteriaId: "678EC327-EAC6-4923-9987-A9B78111B5C4", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:-:lts:*:*:*:*:*", matchCriteriaId: "12DD761F-EA6F-4139-94ED-94EBC0F6A87D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*", matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.", }, { lang: "es", value: "El manipulador de peticiones dbus en (1) network-manager-applet y (2) NetworkManager en Ubuntu v6.06 LTS, v7.10, v8.04 LTS, and v8.10 no verifica adecuadamente los privilegios, lo que permite a usuarios locales descubrir (a)las contraseñas de la conexión de red y (b)Las claves pre-compartidas a través de peticiones sin especificar.", }, ], id: "CVE-2009-0365", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4.6, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:S/C:C/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.1, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2009-03-05T02:30:00.313", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/34067", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/34177", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/34473", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1021910", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1021911", }, { source: "cve@mitre.org", url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", }, { source: "cve@mitre.org", url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2009/dsa-1955", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/33966", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1021908", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-2", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34177", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34473", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1021910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1021911", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&r2=1207&pathrev=1207", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://svn.gnome.org/viewvc/network-manager-applet?view=revision&revision=1207", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2009/dsa-1955", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2009-0361.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2009-0362.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/33966", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1021908", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/USN-727-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487722", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=487752", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/49062", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-07-07 23:41
Modified
2025-04-09 00:30
Severity ?
Summary
Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:advanced_workstation_for_the_itanium_processor:2.1:*:*:*:*:*:*:*", matchCriteriaId: "3D34CFC7-5112-45FA-A550-07C1174819CE", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "6C8CB34E-02FE-4F90-9642-B56D3B3ACEF6", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "2AB2579A-2BC9-4E16-9641-248222301660", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5_server:*:*:*:*:*:*:*", matchCriteriaId: "4089D3E3-C845-46F4-B4FC-8556D025704E", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:as_2.1:*:*:*:*:*:*:*", matchCriteriaId: "BF3EAB41-5B36-4D27-B319-17687D89868E", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:as_3:*:*:*:*:*:*:*", matchCriteriaId: "421C0021-66EB-4F4C-9D79-6366A4702CC9", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:as_4:*:*:*:*:*:*:*", matchCriteriaId: "F23BD8DF-6E8E-4DF2-A700-8E050D967547", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:es_2.1:*:*:*:*:*:*:*", matchCriteriaId: "627D828A-A35B-4072-AFBA-1D26C68506F6", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:es_3:*:*:*:*:*:*:*", matchCriteriaId: "5B0FE33D-756C-449F-B54C-8677C9AD002D", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:es_4:*:*:*:*:*:*:*", matchCriteriaId: "6BF1F027-C9FF-4583-AB40-E0B757F9EE41", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_2.1:*:*:*:*:*:*:*", matchCriteriaId: "4DB10F52-FF81-4297-A4D3-D3298273D894", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_3:*:*:*:*:*:*:*", matchCriteriaId: "6EA8914F-DB6D-4C21-A727-8B94BE0424BF", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:ws_4:*:*:*:*:*:*:*", matchCriteriaId: "B18EBE6E-482D-435D-851C-73EC301F0A26", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5_client:*:*:*:*:*:*:*", matchCriteriaId: "7C1E0CDD-78D0-4156-8572-6D430EF5499E", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop_workstation:5_client:*:*:*:*:*:*:*", matchCriteriaId: "043A85D0-7F3E-4EC9-9065-3F996B9A0A94", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*", matchCriteriaId: "C8E8256F-3FB6-45B2-8F03-02A61C10FAF0", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_amd64:*:*:*:*:*", matchCriteriaId: "3107F20F-386F-4BF0-814F-4D7CAF0A2CBA", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_i386:*:*:*:*:*", matchCriteriaId: "C027333C-8364-407A-B6D6-7B328C384632", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_powerpc:*:*:*:*:*", matchCriteriaId: "B608D1D1-F05D-4F1B-BDED-A47EEC0E37FE", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:lts_sparc:*:*:*:*:*", matchCriteriaId: "64E79B04-2A84-4A5D-90F3-D4F02FDBA09D", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:amd64:*:*:*:*:*", matchCriteriaId: "7BD79C43-2615-47DE-A100-D21482D866F4", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:i386:*:*:*:*:*", matchCriteriaId: "1856594D-7D84-4830-A8A7-2C9D4C2D61FD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "0B20DDF0-2FAB-4EB0-B62D-2351514B2808", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:sparc:*:*:*:*:*", matchCriteriaId: "B7748895-CE00-4BB8-BFCD-A5559BA15869", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:amd64:*:*:*:*:*", matchCriteriaId: "FB928CC9-0BC3-4AE1-B20B-A58A4C4AAE24", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:i386:*:*:*:*:*", matchCriteriaId: "BB850565-A800-44A6-945E-CB235531C5DD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:lpia:*:*:*:*:*", matchCriteriaId: "A1BB8BDA-3F7A-408F-97FC-CBE422A09CCA", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "3F37A796-E028-4247-A5E6-66B89A583F87", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:sparc:*:*:*:*:*", matchCriteriaId: "61DA44B7-FE1A-4452-843E-EAF1404B86F3", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", matchCriteriaId: "3487FA64-BE04-42CA-861E-3DAC097D7D32", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*", matchCriteriaId: "F61EA4A1-1916-48A5-8196-E3CDEF3108F6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*", matchCriteriaId: "F5AA254D-D41E-464F-9E2A-A950F08C6946", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*", matchCriteriaId: "B05D2655-6641-42BE-9793-30005AC9D40D", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", matchCriteriaId: "57E2C7E7-56C0-466C-BB08-5EB43922C4F9", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", matchCriteriaId: "462E135A-5616-46CC-A9C0-5A7A0526ACC6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", matchCriteriaId: "1E391619-0967-43E1-8CBC-4D54F72A85C2", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", matchCriteriaId: "0544D626-E269-4677-9B05-7DAB23BD103B", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", matchCriteriaId: "C95F7B2C-80FC-4DF2-9680-F74634DCE3E6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", matchCriteriaId: "863C140E-DC15-4A88-AB8A-8AEF9F4B8164", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.1:*:*:*:*:*:*:*", matchCriteriaId: "23D609B2-F66C-40F1-B7D9-965189F875A5", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.4:*:*:*:*:*:*:*", matchCriteriaId: "327D8879-0B61-4681-886D-C53BE251E0ED", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.5:*:*:*:*:*:*:*", matchCriteriaId: "59017F18-6C4E-4803-8A65-DB2A849C3197", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.6:*:*:*:*:*:*:*", matchCriteriaId: "BF006282-943B-4885-B523-6E575D664059", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.9:*:*:*:*:*:*:*", matchCriteriaId: "5CC11707-DF87-4046-964D-40CF22385A48", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_.10:*:*:*:*:*:*:*", matchCriteriaId: "F73F1171-E34D-4AC0-BF8B-3DB38AA13EF3", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox:2.0_8:*:*:*:*:*:*:*", matchCriteriaId: "0422C796-ECC4-42C1-9580-1CE22A096244", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", matchCriteriaId: "D58B704B-F06E-44C1-BBD1-A090D1E6583A", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "40270FBD-744A-49D9-9FFA-1DCD897210D7", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", matchCriteriaId: "20E01097-F60A-4FB2-BA47-84A267EE87D6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", matchCriteriaId: "7F65732F-317B-49A2-B9B0-FA1102B8B45C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "DB430F19-069A-43FD-9097-586D4449D327", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", matchCriteriaId: "76AD0439-3BFB-4AD1-8E2C-99D0B099FA8C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", matchCriteriaId: "1E6D7528-E591-48A6-8165-BE42F8EBF6B6", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "BA710423-0075-44B8-9DCB-6380FA974486", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", matchCriteriaId: "C5521DA3-E6AF-4350-B971-10B4A1C9B1D1", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", matchCriteriaId: "DDD15752-A253-47B1-BCE0-B55B84B47C9F", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.4:*:*:*:*:*:*:*", matchCriteriaId: "63AF48A9-C161-4603-82F0-5D2DE1EBA498", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.5:*:*:*:*:*:*:*", matchCriteriaId: "821E46E8-B084-4762-86F0-002CA288B522", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.6:*:*:*:*:*:*:*", matchCriteriaId: "A084C258-7D78-4F6D-8E24-00BE9608EBFD", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.9:*:*:*:*:*:*:*", matchCriteriaId: "893FD2C8-C8EF-4ED3-9B7C-82D8DA9A1C38", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.12:*:*:*:*:*:*:*", matchCriteriaId: "F9FEA455-E605-4CE3-A951-760D59091C56", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.13:*:*:*:*:*:*:*", matchCriteriaId: "F1758117-4865-42A4-8110-2250924E21FF", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_.14:*:*:*:*:*:*:*", matchCriteriaId: "81AF4BFB-EC89-454B-89DF-FC8F6102E28C", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:2.0_8:*:*:*:*:*:*:*", matchCriteriaId: "8013986B-DCAF-44A1-BA63-5BBA6762720F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Mozilla Firefox before 2.0.0.15 and SeaMonkey before 1.1.10 do not properly escape HTML in file:// URLs in directory listings, which allows remote attackers to conduct cross-site scripting (XSS) attacks or have unspecified other impact via a crafted filename.", }, { lang: "es", value: "Mozilla Firefox anterior a 2.0.0.15 y SeaMonkey anterior a 1.1.10 no escapan correctamente el HTML en listados de directorios file:// URLs, lo que permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) o tener otros impactos no especificados mediante un nombre de archivo modificado.", }, ], id: "CVE-2008-2808", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2008-07-07T23:41:00.000", references: [ { source: "secalert@redhat.com", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/30878", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/30898", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/30903", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30911", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/30949", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31005", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31008", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31021", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31023", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31069", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31076", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31183", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31195", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/31377", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/33433", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/34501", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200808-03.xml", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", }, { source: "secalert@redhat.com", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2008/dsa-1607", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2008/dsa-1615", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2009/dsa-1697", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136", }, { source: "secalert@redhat.com", url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", }, { source: "secalert@redhat.com", url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/30038", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id?1020419", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/usn-619-1", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2008/1993/references", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2009/0977", }, { source: "secalert@redhat.com", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", }, { source: "secalert@redhat.com", url: "https://issues.rpath.com/browse/RPL-2646", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668", }, { source: "secalert@redhat.com", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html", }, { source: "secalert@redhat.com", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html", }, { source: "secalert@redhat.com", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2008-0616.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30878", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30898", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30903", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30911", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30949", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31076", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31195", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/31377", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/33433", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/34501", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200808-03.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.383152", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.384911", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0216", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1607", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1615", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2009/dsa-1697", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:136", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mozilla.org/projects/security/known-vulnerabilities.html#firefox2.0.0.15", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mozilla.org/security/announce/2008/mfsa2008-30.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0547.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0549.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0569.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/494080/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/30038", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1020419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-619-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/1993/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2009/0977", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.mozilla.org/show_bug.cgi?id=411433", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-2646", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9668", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00207.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00288.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00295.html", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small "maximum data bytes" value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samba | samba | 3.0.0 | |
samba | samba | 3.0.1 | |
samba | samba | 3.0.2 | |
samba | samba | 3.0.2a | |
samba | samba | 3.0.3 | |
samba | samba | 3.0.4 | |
samba | samba | 3.0.4 | |
samba | samba | 3.0.5 | |
samba | samba | 3.0.6 | |
samba | samba | 3.0.7 | |
conectiva | linux | 10.0 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux_desktop | 3.0 | |
redhat | fedora_core | core_2.0 | |
redhat | fedora_core | core_3.0 | |
redhat | linux_advanced_workstation | 2.1 | |
redhat | linux_advanced_workstation | 2.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", matchCriteriaId: "F84FB25B-5EA5-48DC-B528-E8CCF714C919", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "216145B7-4716-42F7-90DC-03884ECB2271", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "898968E5-577E-4B86-A804-EBEC67157A61", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*", matchCriteriaId: "920EF846-41D1-429D-AF0F-3D7950F93069", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "8016DC4F-F410-4401-BDCC-91BE0D44D028", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*", matchCriteriaId: "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*", matchCriteriaId: "632D2489-3B5E-466E-A6DF-1EF00303869B", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "9FC116E5-B739-4E18-AA51-FFF59EBCA08F", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*", matchCriteriaId: "3D40F682-9F2E-465F-98F7-23E1036C74A2", vulnerable: true, }, { criteria: "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*", matchCriteriaId: "9478CC84-802F-4960-ACAB-3700154E813F", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute arbitrary code via a TRANSACT2_QFILEPATHINFO request with a small \"maximum data bytes\" value.", }, ], id: "CVE-2004-0882", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-27T05:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt", }, { source: "cve@mitre.org", url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P", }, { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13189", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/132004.html", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1012235", }, { source: "cve@mitre.org", url: "http://www.ciac.org/ciac/bulletins/p-038.shtml", }, { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/457622", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/11782", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.trustix.net/errata/2004/0058/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000899", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110054671403755&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110055646329581&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110330519803655&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13189", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/132004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1012235", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ciac.org/ciac/bulletins/p-038.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/457622", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_40_samba.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/11782", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.trustix.net/errata/2004/0058/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9969", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-07-06 20:05
Modified
2025-04-03 01:03
Severity ?
Summary
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 5.04 | |
ubuntu | ubuntu_linux | 5.04 | |
ubuntu | ubuntu_linux | 5.04 | |
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.06_lts |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*", matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.", }, { lang: "es", value: "Comando passwd en shadow, en Ubuntu 5.04 through 6.06 LTS, cuando se pasa como parámetro –f, -g o –s, no comprueba el código de retorno de una llamada seguid, lo que podría provocar que usuarios locales obtuvieran privilegios de administrador (root) si seguid falla en casos como errores PAM o límite de recursos.", }, ], id: "CVE-2006-3378", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-07-06T20:05:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/20950", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20966", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/21480", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1150", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/26995", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/18850", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-308-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20966", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/21480", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1150", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/26995", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/18850", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-308-1", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "This issue affects the version of the passwd command from the shadow-utils package. Red Hat Enterprise Linux 2.1, 3, and 4 are not vulnerable to this issue.", lastModified: "2006-08-16T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*", matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*", matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*", matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*", matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*", matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*", matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*", matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*", matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*", matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*", matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*", matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*", matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*", matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*", matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*", matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*", matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*", matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*", matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*", matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*", matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.", }, ], id: "CVE-2004-0817", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-12-31T05:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-465.html", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/11084", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:089", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-465.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/11084", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17182", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8843", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", }, { lang: "es", value: "La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de paquetes fragmentados, lo que podría permitir a servidores samba remotos:\r\n\r\nleer información del kernel de su elección\r\naumentar un valor de un contador en un número arbitrario enviando la primera parte del paquete fragmentado varias veces.", }, ], id: "CVE-2004-0949", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13232/", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20162", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20163", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20202", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20338", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/142004.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11695", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2004/0061/", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-30-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13232/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/142004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11695", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2004/0061/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18137", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10360", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-30-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*", matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*", matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*", matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*", matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*", matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*", matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*", matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*", matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*", matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*", matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*", matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*", matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*", matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*", matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*", matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*", matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*", matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*", matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*", matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*", matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the BMP loader in imlib2 before 1.1.2 allows remote attackers to execute arbitrary code via a specially-crafted BMP image, a different vulnerability than CVE-2004-0817.", }, ], id: "CVE-2004-0802", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2004-12-31T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, { source: "cve@mitre.org", url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/11084", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000870", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201611-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200409-12.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:089", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/11084", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vuxml.org/freebsd/ba005226-fb5b-11d8-9837-000c41e2cdad.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17183", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.2 | |
linux | linux_kernel | 2.6.3 | |
linux | linux_kernel | 2.6.4 | |
linux | linux_kernel | 2.6.5 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.9 | |
linux | linux_kernel | 2.6.10 | |
linux | linux_kernel | 2.6_test9_cvs | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", }, { lang: "es", value: "El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video.", }, ], id: "CVE-2004-1056", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/17002", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-529.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-551.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-663.html", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2005/1878", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-38-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/17002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-529.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-551.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-663.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2005/1878", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/15972", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9795", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-38-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-10-11 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", matchCriteriaId: "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "16C117F3-3684-4683-9F9E-CEDD5B88F9CA", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "9DF8DD37-A337-4E9D-A34E-C2D561A24285", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*", matchCriteriaId: "492EA1BE-E678-4300-A690-3BFCD4B233B2", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*", matchCriteriaId: "4E3C9031-F69A-4B6A-A8CB-39027174AA01", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_01:*:sparc:*:*:*:*:*", matchCriteriaId: "7317C4A1-1365-40DD-A86F-808B64863750", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_01:*:x86:*:*:*:*:*", matchCriteriaId: "7188371F-AE6E-437D-8F75-DE7049A51000", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_02:*:sparc:*:*:*:*:*", matchCriteriaId: "79D94087-1308-408F-8C73-600B73AD958F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_02:*:x86:*:*:*:*:*", matchCriteriaId: "015968E1-B81E-4242-B4DF-94716179053B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_03:*:sparc:*:*:*:*:*", matchCriteriaId: "DA468ACC-9AE2-4EF6-9B09-CF63092021D7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_03:*:x86:*:*:*:*:*", matchCriteriaId: "92262770-06B3-4B68-8DBE-AB6C61135F7C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_04:*:sparc:*:*:*:*:*", matchCriteriaId: "16719C48-5A35-4FEC-BE5F-3EA10A0357CC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_04:*:x86:*:*:*:*:*", matchCriteriaId: "C4DC58C1-792B-433D-A27B-5731C8414EBC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_05:*:sparc:*:*:*:*:*", matchCriteriaId: "5F87D3D5-0D3F-44BB-B15B-BB6D903A56E7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_05:*:x86:*:*:*:*:*", matchCriteriaId: "4AC63928-38F2-4677-8CBC-2F7DE0EF078F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_06:*:sparc:*:*:*:*:*", matchCriteriaId: "438EA608-2748-49E9-9B2A-663C774E627F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_06:*:x86:*:*:*:*:*", matchCriteriaId: "41B216C6-4BE9-4D47-A86E-4AD50ECB8F07", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_07:*:sparc:*:*:*:*:*", matchCriteriaId: "B7E3945D-1580-4C68-93E0-E4CF96620C6C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_07:*:x86:*:*:*:*:*", matchCriteriaId: "32AE7035-EA81-4A9B-A4C3-B85844E24FA5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_08:*:sparc:*:*:*:*:*", matchCriteriaId: "51469BA0-7B46-4E79-9E35-A388AD834B29", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_08:*:x86:*:*:*:*:*", matchCriteriaId: "948CAA3F-C5B0-434E-A4B1-16600729A17E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_09:*:sparc:*:*:*:*:*", matchCriteriaId: "49F52449-96AB-45BA-95F6-581F720D1819", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_09:*:x86:*:*:*:*:*", matchCriteriaId: "168AD0C1-B437-4B5D-8AC4-BA4C6C60829B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_10:*:sparc:*:*:*:*:*", matchCriteriaId: "7FC6243A-A896-4E52-B241-BDEA7486DAC3", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_10:*:x86:*:*:*:*:*", matchCriteriaId: "CDAD01B1-25E3-4ABD-BA48-03491D9C0D84", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_11:*:sparc:*:*:*:*:*", matchCriteriaId: "E88850F1-A647-44B3-806A-71FC157D4964", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_11:*:x86:*:*:*:*:*", matchCriteriaId: "B38088AD-968D-44B9-ABCE-4E4D8675A88A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_12:*:sparc:*:*:*:*:*", matchCriteriaId: "9D15E371-4317-4882-BA09-F8CABB632C2C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_12:*:x86:*:*:*:*:*", matchCriteriaId: "7C385492-0B33-4757-9907-E69C7F709527", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_13:*:sparc:*:*:*:*:*", matchCriteriaId: "311FC329-D973-4F51-B110-7FF1ED40DFA5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_13:*:x86:*:*:*:*:*", matchCriteriaId: "01C7A393-6744-4913-A9CC-75F311D2C59F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_14:*:sparc:*:*:*:*:*", matchCriteriaId: "0288EC6B-C561-475C-9A3D-1ACF395B7326", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_14:*:x86:*:*:*:*:*", matchCriteriaId: "F4961C98-1C39-4E6E-A0DB-C48E40F4FF54", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_15:*:sparc:*:*:*:*:*", matchCriteriaId: "D5CBEFF0-7B69-4831-AAC7-C02455D42900", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_15:*:x86:*:*:*:*:*", matchCriteriaId: "4DCF6792-8671-4CC0-99D5-7224E2B751A1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_16:*:sparc:*:*:*:*:*", matchCriteriaId: "6D4F7E6E-330F-4E02-A2FE-F7288ADFFA0C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_16:*:x86:*:*:*:*:*", matchCriteriaId: "FFB7E165-13D6-41D5-B1C3-F96669E54796", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_17:*:sparc:*:*:*:*:*", matchCriteriaId: "B5D6CD58-C4AF-42AC-9377-EC1F1308FF29", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_17:*:x86:*:*:*:*:*", matchCriteriaId: "D6011B94-9326-47A7-8292-BA0210401DC4", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_18:*:sparc:*:*:*:*:*", matchCriteriaId: "AF924217-C227-4B90-9781-00561CE9C54A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_18:*:x86:*:*:*:*:*", matchCriteriaId: "9C2C4B0B-9B7A-4861-8CA8-64FC84DF31BF", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_19:*:sparc:*:*:*:*:*", matchCriteriaId: "114D9D19-23BC-41AF-9B30-40AB2852E74F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_19:*:x86:*:*:*:*:*", matchCriteriaId: "F36C1E99-8CCD-48B7-94A7-8753AD7D6FBA", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_20:*:sparc:*:*:*:*:*", matchCriteriaId: "F620054A-4D53-443B-8897-B2A5AB928CA2", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_20:*:x86:*:*:*:*:*", matchCriteriaId: "2F57B586-3593-41F9-9D01-0E18F58EB81A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_21:*:sparc:*:*:*:*:*", matchCriteriaId: "FD1FDEB4-E659-41D0-B81E-FC1A1391288E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_21:*:x86:*:*:*:*:*", matchCriteriaId: "2E3B6A48-CA60-4ED9-BFF9-0FCDFABA865A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_22:*:sparc:*:*:*:*:*", matchCriteriaId: "218570AD-18C7-440E-A5BD-F16708ED4B08", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_22:*:x86:*:*:*:*:*", matchCriteriaId: "09162A43-7EF2-464D-AD60-7046456932B5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_23:*:sparc:*:*:*:*:*", matchCriteriaId: "2336F214-18CC-42A5-9DD0-1F1C09959CC9", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_23:*:x86:*:*:*:*:*", matchCriteriaId: "3A4ECA0D-AB73-4790-945B-98CF6E27B94F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_24:*:sparc:*:*:*:*:*", matchCriteriaId: "207D2103-58A9-4BF9-81EF-74B264DB1B4B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_24:*:x86:*:*:*:*:*", matchCriteriaId: "530E1CDB-3B46-4762-875F-0B1075790204", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_25:*:sparc:*:*:*:*:*", matchCriteriaId: "8A4F9110-059D-4F6E-9414-762BD6142CDE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_25:*:x86:*:*:*:*:*", matchCriteriaId: "55888CA5-938A-42D4-9898-93ED1AD88650", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_26:*:sparc:*:*:*:*:*", matchCriteriaId: "F1B245F6-DE46-4D52-98EE-32601FBCD254", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_26:*:x86:*:*:*:*:*", matchCriteriaId: "5D99E1F3-0341-43A9-9692-2AC812811EA6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_27:*:sparc:*:*:*:*:*", matchCriteriaId: "28F4B989-7F55-467F-AD1A-AB965D31F504", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_27:*:x86:*:*:*:*:*", matchCriteriaId: "27CA0C51-8331-459A-8256-9E363BE313BE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_28:*:sparc:*:*:*:*:*", matchCriteriaId: "9B6404BC-090E-419B-B10C-D275D5C0BFE5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_28:*:x86:*:*:*:*:*", matchCriteriaId: "3FD00DE9-D8A8-4A03-B4B8-3F4368ADDDE6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_29:*:sparc:*:*:*:*:*", matchCriteriaId: "4CF81FF0-D544-4C56-AD2E-51098DF2A1D1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_29:*:x86:*:*:*:*:*", matchCriteriaId: "4EFFA4CB-0984-4686-94BD-CE4D8AD70C42", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_30:*:sparc:*:*:*:*:*", matchCriteriaId: "65F861F1-E66D-479D-838D-19D94DF03736", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_30:*:x86:*:*:*:*:*", matchCriteriaId: "BF0C5932-3B2B-44C8-8C0C-31A0CB66FF7E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_31:*:sparc:*:*:*:*:*", matchCriteriaId: "71FDF1A5-BD49-4E00-979E-3F953265E681", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_31:*:x86:*:*:*:*:*", matchCriteriaId: "B40B4B4C-34F3-4591-8989-D7D138D54C88", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_32:*:sparc:*:*:*:*:*", matchCriteriaId: "815771B3-541B-41D5-925F-29CB74900668", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_32:*:x86:*:*:*:*:*", matchCriteriaId: "14FD3B27-6379-4F5C-9172-2A0494667727", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_33:*:sparc:*:*:*:*:*", matchCriteriaId: "1EEAE62A-8BFA-4EB4-B4E9-DF83F4A33CCE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_33:*:x86:*:*:*:*:*", matchCriteriaId: "114D8B9E-BDE9-49E6-9CD3-18B087522577", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_34:*:sparc:*:*:*:*:*", matchCriteriaId: "72827B1E-3F3D-40A0-AEEB-0CFFB12BF6D8", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_34:*:x86:*:*:*:*:*", matchCriteriaId: "8275DABB-E792-4134-8418-496109936C1A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_35:*:sparc:*:*:*:*:*", matchCriteriaId: "6F61F300-FEB0-42A7-87AE-E99AF2C26827", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_35:*:x86:*:*:*:*:*", matchCriteriaId: "56768A4B-ABC8-4CF8-ABF1-059C8D4373CE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_36:*:sparc:*:*:*:*:*", matchCriteriaId: "E64D67D0-E57D-46A9-BA7E-BB7FA05C0907", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_36:*:x86:*:*:*:*:*", matchCriteriaId: "E249DDE1-EC3B-4A5C-A900-498526173570", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_37:*:sparc:*:*:*:*:*", matchCriteriaId: "9500D5B2-DA1D-4082-83E4-92715D7F2D24", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_37:*:x86:*:*:*:*:*", matchCriteriaId: "2BE4A7FC-6112-4879-B083-19CC70DC6B91", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_38:*:sparc:*:*:*:*:*", matchCriteriaId: "DD44C2D3-A690-4A9B-B855-EC2FEE8F5169", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_38:*:x86:*:*:*:*:*", matchCriteriaId: "DE882906-FF9D-492A-BDB7-237575D5E278", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_39:*:sparc:*:*:*:*:*", matchCriteriaId: "C92D0B2A-BA10-4AEB-84B9-962DD1AA76EB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_39:*:x86:*:*:*:*:*", matchCriteriaId: "977AA6F7-F821-4229-B413-276231366899", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_40:*:sparc:*:*:*:*:*", matchCriteriaId: "BF7D0B02-7E5C-4760-96B2-902C680B897C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_40:*:x86:*:*:*:*:*", matchCriteriaId: "F7B6E01F-E4EA-497E-BFB3-975F0123B4E5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_41:*:sparc:*:*:*:*:*", matchCriteriaId: "CF68EA11-632F-4710-8CC7-192AF1BD7BB0", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_41:*:x86:*:*:*:*:*", matchCriteriaId: "9E644312-D55A-427F-BE4C-9AD280CC73F3", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_42:*:sparc:*:*:*:*:*", matchCriteriaId: "F9EC26BC-09D3-4F19-864F-7A1C4EC4756B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_42:*:x86:*:*:*:*:*", matchCriteriaId: "E7B7C4DE-DD83-4F61-B214-F0F9BD76E188", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_43:*:sparc:*:*:*:*:*", matchCriteriaId: "5994A4EE-3808-4863-B771-36864E202679", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_43:*:x86:*:*:*:*:*", matchCriteriaId: "EF568362-9967-4ACB-A880-163A2E14D99A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_44:*:sparc:*:*:*:*:*", matchCriteriaId: "E977D01C-9C4B-411F-844E-7464147A12D8", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_44:*:x86:*:*:*:*:*", matchCriteriaId: "13B5EE88-E97B-47A1-8999-21C8C4D0C0E6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_45:*:sparc:*:*:*:*:*", matchCriteriaId: "A37177FE-FB56-4BCB-88BA-B91963DA19EE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_45:*:x86:*:*:*:*:*", matchCriteriaId: "BD456A40-4017-4509-A4B0-44FBB3443645", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_46:*:sparc:*:*:*:*:*", matchCriteriaId: "BE640F29-CD64-44DD-9561-E205C5C241C1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_46:*:x86:*:*:*:*:*", matchCriteriaId: "F9456E55-1587-4BBF-A073-601D34E0CDB6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_47:*:sparc:*:*:*:*:*", matchCriteriaId: "078D7F9B-E2A8-4DC2-AD2E-FB0865091ECE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_47:*:x86:*:*:*:*:*", matchCriteriaId: "CD289DC7-2779-47B6-B44C-6B3C6EC5F93D", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_48:*:sparc:*:*:*:*:*", matchCriteriaId: "0FE35481-4580-4208-A6FA-7A0429D73793", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_48:*:x86:*:*:*:*:*", matchCriteriaId: "8163CA38-BF92-4F02-85EA-E6EFD5A500F3", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_49:*:sparc:*:*:*:*:*", matchCriteriaId: "84652D52-B89B-4127-9670-5FCDBBDE8053", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_49:*:x86:*:*:*:*:*", matchCriteriaId: "6043F9A0-5FA1-4101-8452-E7A8652FE79C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_50:*:sparc:*:*:*:*:*", matchCriteriaId: "CE51773E-C93C-4549-907A-5AF380F24B7C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_50:*:x86:*:*:*:*:*", matchCriteriaId: "3CDC9FF7-5FC1-4473-920F-37105009BF2D", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_51:*:sparc:*:*:*:*:*", matchCriteriaId: "D98D67BD-6C94-4E77-B6AC-3199C281A1BC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_51:*:x86:*:*:*:*:*", matchCriteriaId: "6789ECB3-925F-4E16-9213-12FE3EB191CA", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_52:*:sparc:*:*:*:*:*", matchCriteriaId: "914CF995-B18B-43D2-AA9D-B486E768AFD6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_52:*:x86:*:*:*:*:*", matchCriteriaId: "9D309DD1-37A6-49BC-B8DB-6260D47DDD71", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_53:*:sparc:*:*:*:*:*", matchCriteriaId: "922EE565-E3C2-44BA-9970-224FF874AE4A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_53:*:x86:*:*:*:*:*", matchCriteriaId: "28CBB9C9-54DB-4259-9D9F-C617E23C4221", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_54:*:sparc:*:*:*:*:*", matchCriteriaId: "F8E26C9E-F87E-4484-89B9-42471F8410B6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_54:*:x86:*:*:*:*:*", matchCriteriaId: "FC09D568-2B1E-46A2-9029-B3850E5A1167", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_55:*:sparc:*:*:*:*:*", matchCriteriaId: "79E3D7EB-5B19-4D35-BE23-AB477E08FFEC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_55:*:x86:*:*:*:*:*", matchCriteriaId: "96E164AF-3346-4FF3-875A-5EA239F50BDB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_56:*:sparc:*:*:*:*:*", matchCriteriaId: "B06BC6D2-385C-4BC4-9AAB-EEFF600DF2EC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_56:*:x86:*:*:*:*:*", matchCriteriaId: "D3B05762-2B56-41A1-B424-54A5CFFEC47A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_57:*:sparc:*:*:*:*:*", matchCriteriaId: "15B2F895-CBFB-4E19-AF7E-7011EB0A372E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_57:*:x86:*:*:*:*:*", matchCriteriaId: "A6442F9F-E16E-4146-BA6D-92BBCB71EC63", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_58:*:sparc:*:*:*:*:*", matchCriteriaId: "311F14F7-EE01-4525-8C58-8BF650246026", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_58:*:x86:*:*:*:*:*", matchCriteriaId: "4D10B1B2-698B-4F02-9392-682AF78EC633", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_59:*:sparc:*:*:*:*:*", matchCriteriaId: "BC339789-4DC4-4A82-A1BE-CE59AC0D657F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_59:*:x86:*:*:*:*:*", matchCriteriaId: "B69EECEC-86DB-4F35-9204-B0931ABC28DF", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_60:*:sparc:*:*:*:*:*", matchCriteriaId: "CF7C1C94-48A4-4F46-A337-92EB7B8C6837", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_60:*:x86:*:*:*:*:*", matchCriteriaId: "8130EE2C-DC76-4BE3-B2DC-6FC540CD5277", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_61:*:sparc:*:*:*:*:*", matchCriteriaId: "14C63D62-F6D4-4616-AF05-5E3387D63BC1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_61:*:x86:*:*:*:*:*", matchCriteriaId: "CFC0C58B-980F-4C65-97BF-67C9E731BA11", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_62:*:sparc:*:*:*:*:*", matchCriteriaId: "6624E8DE-696A-402C-9088-CFE8ECC086BC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_62:*:x86:*:*:*:*:*", matchCriteriaId: "B0F7D5DE-0491-47F6-834A-0FA208213010", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_63:*:sparc:*:*:*:*:*", matchCriteriaId: "04B5A32E-3D42-4500-A2BE-7ADFF3903386", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_63:*:x86:*:*:*:*:*", matchCriteriaId: "8071BF6A-789C-4DB7-8247-B86EA34DB9B1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_64:*:sparc:*:*:*:*:*", matchCriteriaId: "244EBFE7-05DD-4BBB-9793-310D71AC1721", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_64:*:x86:*:*:*:*:*", matchCriteriaId: "EECE627D-3AE8-4207-87A8-F95746F693F1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_65:*:sparc:*:*:*:*:*", matchCriteriaId: "325EF996-AB8D-48CE-9A59-D338C823D927", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_65:*:x86:*:*:*:*:*", matchCriteriaId: "E6950900-2293-4DA0-89E8-DAFABBF423DF", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_66:*:sparc:*:*:*:*:*", matchCriteriaId: "0EC8063A-1266-4443-B404-BB9C4D265B75", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_66:*:x86:*:*:*:*:*", matchCriteriaId: "AB4764E7-E772-45BC-896B-C7BE287A8EAE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_67:*:sparc:*:*:*:*:*", matchCriteriaId: "424C989F-99C8-4337-AF15-4A51329938DC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_67:*:x86:*:*:*:*:*", matchCriteriaId: "4122F0EE-3A2F-456F-B8CF-82565F8DCD4E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_68:*:sparc:*:*:*:*:*", matchCriteriaId: "DA7ED4ED-938F-44B7-85ED-AFA6728DFE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_68:*:x86:*:*:*:*:*", matchCriteriaId: "5686A925-4978-4883-8DC1-978B09DC9489", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_69:*:sparc:*:*:*:*:*", matchCriteriaId: "43F1BFC7-BA9F-44EE-BD08-F70DFB2CFB33", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_69:*:x86:*:*:*:*:*", matchCriteriaId: "13B81B14-84C8-468A-AE11-30C4CB85E6F5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_70:*:sparc:*:*:*:*:*", matchCriteriaId: "059880C5-B7FF-492D-97CA-FBC174FF8BF1", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_70:*:x86:*:*:*:*:*", matchCriteriaId: "6395A3A9-97F2-4C88-B6D6-70DB2ACDC70D", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_71:*:sparc:*:*:*:*:*", matchCriteriaId: "5AC08000-2E71-465A-85F0-1AB8D1A51762", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_71:*:x86:*:*:*:*:*", matchCriteriaId: "8CC54F69-E96A-482F-B43D-2E3A7EC90E47", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_72:*:sparc:*:*:*:*:*", matchCriteriaId: "D5CCA31F-9BF3-4E6F-B72C-1A54AFB1D07B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_72:*:x86:*:*:*:*:*", matchCriteriaId: "CDC656B7-529A-4963-955D-301A11CF5D09", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_73:*:sparc:*:*:*:*:*", matchCriteriaId: "C5D58609-62CB-446F-995E-FD334B89F6BD", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_73:*:x86:*:*:*:*:*", matchCriteriaId: "506769C9-D306-4EEC-BE2E-6E501CBE90BB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_74:*:sparc:*:*:*:*:*", matchCriteriaId: "D45394E8-BE87-4BAC-89CE-B1F0E4BBBE94", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_74:*:x86:*:*:*:*:*", matchCriteriaId: "37540C8F-FCC1-42DA-8EE3-D3E4FA5B315C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_75:*:sparc:*:*:*:*:*", matchCriteriaId: "1B0F8F99-99B0-4A01-884B-442CEF8D061A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_75:*:x86:*:*:*:*:*", matchCriteriaId: "7AD5054B-18D8-44AE-AA4F-A07D12A63E55", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_76:*:sparc:*:*:*:*:*", matchCriteriaId: "0CCE3456-0BA0-4303-B7CE-22B63EE86F03", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_76:*:x86:*:*:*:*:*", matchCriteriaId: "4BAD68C2-4AA2-4346-B279-51206E0651FF", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_77:*:sparc:*:*:*:*:*", matchCriteriaId: "A4027F7E-F867-4DC7-BA53-08D7B36E13F6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_77:*:x86:*:*:*:*:*", matchCriteriaId: "96F3D4B3-7828-40EB-BD67-A3CD5B210787", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_78:*:sparc:*:*:*:*:*", matchCriteriaId: "906228D3-2561-45C0-A79D-BAAC9F1AD7ED", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_78:*:x86:*:*:*:*:*", matchCriteriaId: "C166F9F7-E8AB-4BA1-AEB6-1E7964976801", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_79:*:sparc:*:*:*:*:*", matchCriteriaId: "7BE4DE93-D189-4528-89DA-17E9325457E7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_79:*:x86:*:*:*:*:*", matchCriteriaId: "12B6730F-6CF1-4990-953F-1CC76D78B618", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_80:*:sparc:*:*:*:*:*", matchCriteriaId: "C4D46760-1924-4713-963E-E4A9AD085394", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_80:*:x86:*:*:*:*:*", matchCriteriaId: "03B96DE7-70BD-4CD8-9574-8C024E51E91C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_81:*:sparc:*:*:*:*:*", matchCriteriaId: "B579204A-62EB-4D86-A22B-0726B9CB88DE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_81:*:x86:*:*:*:*:*", matchCriteriaId: "52D5BB76-FF5E-4BBA-A2D0-00EB574B9104", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_82:*:sparc:*:*:*:*:*", matchCriteriaId: "636FD13F-0A30-4B03-8AEC-ED225FC71251", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_82:*:x86:*:*:*:*:*", matchCriteriaId: "C29B1192-D709-48FB-816C-B4F30460E957", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_83:*:sparc:*:*:*:*:*", matchCriteriaId: "B0593352-A568-4DDA-B1B8-77FA6DC93B54", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_83:*:x86:*:*:*:*:*", matchCriteriaId: "6DB1AC08-2564-4AAB-82AE-EB504FAA34FB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_84:*:sparc:*:*:*:*:*", matchCriteriaId: "5299CAB1-9819-4AE4-9429-8CA32F692C86", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_84:*:x86:*:*:*:*:*", matchCriteriaId: "46D8D5D1-8855-4116-99B3-EA1F78FDEF02", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_85:*:sparc:*:*:*:*:*", matchCriteriaId: "ECD23A89-A86B-44D3-A3D1-EFF3D8551DCE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_85:*:x86:*:*:*:*:*", matchCriteriaId: "999FFE1D-D7D4-476B-8A46-9D0179DB570B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_86:*:sparc:*:*:*:*:*", matchCriteriaId: "75B778E3-EFCF-4AB0-B2C7-E585C190CD3A", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_86:*:x86:*:*:*:*:*", matchCriteriaId: "2B14945C-350A-4895-92C1-932208533F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_87:*:sparc:*:*:*:*:*", matchCriteriaId: "80CFB4CD-CE38-4F24-87EE-0CA622E4E9A6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_87:*:x86:*:*:*:*:*", matchCriteriaId: "513D435B-D28B-4833-88E6-A1A8743177F3", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_88:*:sparc:*:*:*:*:*", matchCriteriaId: "460EE9E9-27BA-4C8B-9F06-BBA648105720", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_88:*:x86:*:*:*:*:*", matchCriteriaId: "4126C6C9-90AB-470E-AF83-4ED1FDD90511", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_89:*:sparc:*:*:*:*:*", matchCriteriaId: "57CA01EF-2AFC-44FB-96EE-AF85B3019BEF", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_89:*:x86:*:*:*:*:*", matchCriteriaId: "3275E47F-5A4B-4843-A07C-82DEE852672C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_90:*:sparc:*:*:*:*:*", matchCriteriaId: "CD673F9F-442E-4997-A0E3-D4B595D16B3E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_90:*:x86:*:*:*:*:*", matchCriteriaId: "58017DDC-63B3-458C-9803-4683211A4C3C", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_91:*:sparc:*:*:*:*:*", matchCriteriaId: "0BEADEEA-4D63-4E69-BFEE-02205150F909", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_91:*:x86:*:*:*:*:*", matchCriteriaId: "6692EE63-A76B-47C3-BC0D-7C15CA6FE013", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_92:*:sparc:*:*:*:*:*", matchCriteriaId: "54DA5312-D935-444E-8154-514C5BD6E3F9", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_92:*:x86:*:*:*:*:*", matchCriteriaId: "BA1E27E5-FE20-42FA-9A61-A7174E705EB3", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_93:*:sparc:*:*:*:*:*", matchCriteriaId: "EA41BAD9-BC09-4E5C-8759-AD4E4D2B3ACC", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_93:*:x86:*:*:*:*:*", matchCriteriaId: "65A32803-580D-4D07-B39B-2159258CBA8B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_94:*:sparc:*:*:*:*:*", matchCriteriaId: "FF6EFE12-51AD-4879-9529-B7EA425059C5", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_94:*:x86:*:*:*:*:*", matchCriteriaId: "13B51612-3BD6-449F-AD63-D01F8D05B269", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_95:*:sparc:*:*:*:*:*", matchCriteriaId: "7E32AD47-A96B-4A83-AEA2-98E6DD1FD5BE", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_95:*:x86:*:*:*:*:*", matchCriteriaId: "4B2E7E54-2268-4C54-9363-C2D363D3A447", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_96:*:sparc:*:*:*:*:*", matchCriteriaId: "7A54DEC9-4F04-4E0A-B253-8822F114DCC0", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_96:*:x86:*:*:*:*:*", matchCriteriaId: "F6000B0F-0E72-4E68-A5EE-35BA6FB59C57", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_97:*:sparc:*:*:*:*:*", matchCriteriaId: "447E9E9E-5B19-4261-8B70-F63EAE61DB95", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_97:*:x86:*:*:*:*:*", matchCriteriaId: "51AB0746-66E6-4FF5-9CB2-42E29A01C961", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_98:*:sparc:*:*:*:*:*", matchCriteriaId: "2B4A015E-802F-4440-AF10-683B5E0586B9", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_98:*:x86:*:*:*:*:*", matchCriteriaId: "D1A9DCF7-F469-4D77-966F-3721F377D80B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_99:*:sparc:*:*:*:*:*", matchCriteriaId: "04D12F3A-4C47-4B49-B3DE-484C1EE466E0", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_99:*:x86:*:*:*:*:*", matchCriteriaId: "3D028821-CA38-48C4-9324-222526AC8413", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_100:*:sparc:*:*:*:*:*", matchCriteriaId: "5BE8232A-2464-449A-A7B6-D44447AA9080", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_100:*:x86:*:*:*:*:*", matchCriteriaId: "1F2CB558-9390-4AAE-A66D-E3DA537E3115", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_101:*:sparc:*:*:*:*:*", matchCriteriaId: "37D9D7A5-63F5-49F6-90EE-EBE5B3FA6DBA", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_101:*:x86:*:*:*:*:*", matchCriteriaId: "5ED4FAD0-E91F-438D-A3CB-BACFB7F7E975", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*", matchCriteriaId: "6061C499-21A8-4EC4-B5AD-F6E876B15C48", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*", matchCriteriaId: "411B33D1-F55D-42C0-9046-040ABC42E31B", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:8.0:*:sparc:*:*:*:*:*", matchCriteriaId: "32CF7469-6D2F-4E34-8013-7F0D3433D0B2", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", matchCriteriaId: "1894C542-AA81-40A9-BF47-AE24C93C1ACB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", matchCriteriaId: "A711CDC2-412C-499D-9FA6-7F25B06267C6", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", matchCriteriaId: "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", matchCriteriaId: "7BF232A9-9E0A-481E-918D-65FC82EF36D8", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*", matchCriteriaId: "0C0C3793-E011-4915-8F86-CE622A2D37D1", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*", matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*", matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*", matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU.", }, { lang: "es", value: "Un desbordamiento de búfer en la región stack de la memoria en la función cons_options en el archivo options.c en dhcpd en OpenBSD versiones 4.0 hasta 4.2, y algunas otras implementaciones de dhcpd basadas en ISC dhcp-2, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (bloqueo del demonio) por medio de una petición DHCP que especifica un tamaño máximo de mensaje más pequeño que el IP MTU mínimo.", }, ], id: "CVE-2007-5365", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-10-11T10:17:00.000", references: [ { source: "cve@mitre.org", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27160", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27273", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27338", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27350", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/32668", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1021157", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1", }, { source: "cve@mitre.org", url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2007/dsa-1388", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.openbsd.org/errata40.html#016_dhcpd", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.openbsd.org/errata41.html#010_dhcpd", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.openbsd.org/errata42.html#001_dhcpd", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/25984", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/32213", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id?1018794", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-531-1", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-531-2", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/3088", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817", }, { source: "cve@mitre.org", url: "https://www.exploit-db.com/exploits/4601", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446354", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27160", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27273", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/27350", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/32668", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1021157", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-21-109077-21-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-243806-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1962", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2007/dsa-1388", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/dhcpd/options.c", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.openbsd.org/errata40.html#016_dhcpd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.openbsd.org/errata41.html#010_dhcpd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.openbsd.org/errata42.html#001_dhcpd", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0970.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/482085/100/100/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/483230/100/100/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/25984", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/32213", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1018794", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-531-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-531-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/3088", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37045", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5817", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.exploit-db.com/exploits/4601", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-03-21 19:19
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*", matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:*:*:*:*:*:*", matchCriteriaId: "AD9460AD-229A-4DC2-BFBA-818640A464AD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:inkscape:inkscape:0.40:*:*:*:*:*:*:*", matchCriteriaId: "6D218B9A-193B-4956-B710-8998FC60A6F3", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.41:*:*:*:*:*:*:*", matchCriteriaId: "A061EEF7-FBD3-4BBD-BCAA-9F765567C606", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.42:*:*:*:*:*:*:*", matchCriteriaId: "57038D30-192C-4899-A705-E951E162B871", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.42.1:*:*:*:*:*:*:*", matchCriteriaId: "45441330-3BDD-4F8F-B128-0C431AB9A9C2", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.42.2:*:*:*:*:*:*:*", matchCriteriaId: "4783CB07-5F32-4FF6-85D4-2F3FE21DD75B", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.43:*:*:*:*:*:*:*", matchCriteriaId: "6EAE5DD1-E2DB-4905-83B2-348257A4E49C", vulnerable: true, }, { criteria: "cpe:2.3:a:inkscape:inkscape:0.44:*:*:*:*:*:*:*", matchCriteriaId: "F6EBAFFC-12A6-42D2-9840-289BFD720F8A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Format string vulnerability in Inkscape before 0.45.1 allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a URI, which is not properly handled by certain dialogs.", }, { lang: "es", value: "Vulnerabilidad en el formato de cadena en el Inkscape anterior al 0.45.1 permite a atacantes con la intervención del usuario ejecutar código de su elección mediante especificadores del formato de cadena en una URI,lo que no es manejado correctamente mediante ciertos diálogos.", }, ], id: "CVE-2007-1463", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2007-03-21T19:19:00.000", references: [ { source: "security@ubuntu.com", url: "http://secunia.com/advisories/24584", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/24597", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/24615", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/24661", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/24859", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/25072", }, { source: "security@ubuntu.com", tags: [ "Patch", ], url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", }, { source: "security@ubuntu.com", url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml", }, { source: "security@ubuntu.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069", }, { source: "security@ubuntu.com", url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html", }, { source: "security@ubuntu.com", url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded", }, { source: "security@ubuntu.com", url: "http://www.securityfocus.com/bid/23070", }, { source: "security@ubuntu.com", url: "http://www.securityfocus.com/bid/23138", }, { source: "security@ubuntu.com", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-438-1", }, { source: "security@ubuntu.com", url: "http://www.vupen.com/english/advisories/2007/1059", }, { source: "security@ubuntu.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163", }, { source: "security@ubuntu.com", url: "https://issues.rpath.com/browse/RPL-1170", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24584", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24597", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24615", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24661", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24859", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25072", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://sourceforge.net/project/shownotes.php?group_id=93438&release_id=495106", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200704-10.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_8_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/463710/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23138", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-438-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1059", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-1170", }, ], sourceIdentifier: "security@ubuntu.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-04-22 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
kde | quanta | 3.1 | |
conectiva | linux | 9.0 | |
conectiva | linux | 10.0 | |
gentoo | linux | * | |
kde | kde | 3.2 | |
kde | kde | 3.2.1 | |
kde | kde | 3.2.2 | |
kde | kde | 3.2.3 | |
kde | kde | 3.3 | |
kde | kde | 3.3.1 | |
kde | kde | 3.3.2 | |
kde | kde | 3.4 | |
redhat | fedora_core | core_3.0 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 5.04 | |
ubuntu | ubuntu_linux | 5.04 | |
ubuntu | ubuntu_linux | 5.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:kde:quanta:3.1:*:*:*:*:*:*:*", matchCriteriaId: "0716B886-DF42-4BB2-BE9F-423A4CBE5001", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*", matchCriteriaId: "9F7180B3-03AC-427C-8CAD-FE06F81C4FF1", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.4:*:*:*:*:*:*:*", matchCriteriaId: "442021C9-BE4D-4BC9-8114-8BEFA9EC1232", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Kommander in KDE 3.2 through KDE 3.4.0 executes data files without confirmation from the user, which allows remote attackers to execute arbitrary code.", }, ], id: "CVE-2005-0754", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-04-22T04:00:00.000", references: [ { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/15060", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20050420-1.txt", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/13313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.0-kdewebdev-kommander.diff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=111419664411051&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/15060", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20050420-1.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/13313", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", }, ], id: "CVE-2004-1137", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "cve@mitre.org", url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://isec.pl/vulnerabilities/isec-0018-igmp.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18481", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18482", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11144", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-05 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "C496B665-70DA-4B98-A5D1-E2935C0CE840", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", matchCriteriaId: "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", matchCriteriaId: "34797660-41F5-4358-B70F-2A40DE48F182", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "27C9E23D-AB82-4AE1-873E-C5493BB96AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*", matchCriteriaId: "4054D69F-596F-4EB4-BE9A-E2478343F55A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*", matchCriteriaId: "CA26ABBE-9973-45FA-9E9B-82170B751219", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "7891202C-62AF-4590-9E5F-3514FDA2B38E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*", matchCriteriaId: "BF8F9B2F-E898-4F87-A245-32A41748587B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", matchCriteriaId: "183667CA-6DF1-4BFB-AE32-9ABF55B7283A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "EBDDEC3F-52EB-4E1E-84C4-B472600059EC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "314BA420-4C74-4060-8ACE-D7A7C041CF2B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "2EAD7613-A5B3-4621-B981-290C7C6B8BA0", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "D1CA3337-9BEE-49C5-9EDE-8CDBE5580537", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*", matchCriteriaId: "EE38C50A-81FE-412E-9717-3672FAE6A6F4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*", matchCriteriaId: "A0A3F7B6-2878-40C0-B59C-EBA8D171D2F7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*", matchCriteriaId: "263F3734-7076-4EA8-B4C0-F37CFC4E979E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*", matchCriteriaId: "0419DD66-FF66-48BC-AD3B-F6AFD0551E36", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*", matchCriteriaId: "C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*", matchCriteriaId: "B982342C-1981-4C55-8044-AFE4D87623DF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*", matchCriteriaId: "47E02BE6-4800-4940-B269-385B66AC5077", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*", matchCriteriaId: "0EB09993-B837-4352-B09D-3656F62638A8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", matchCriteriaId: "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*", matchCriteriaId: "0361EA35-FBD7-4E8F-8625-C8100ED7BB7C", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*", matchCriteriaId: "29EAA113-2404-4ABB-826B-3AA2AA858D02", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", matchCriteriaId: "E3F7EB61-55A5-4776-B0E7-3508920A6CEA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", matchCriteriaId: "A442DE97-4485-4D95-B95D-58947585E455", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "AE31DFF8-06AB-489D-A0C5-509C090283B5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", matchCriteriaId: "1E8A6564-129A-4555-A5ED-6F65C56AE7B4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", matchCriteriaId: "237174A4-E030-4A0B-AD0B-5C463603EAA4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "DF49BF03-C25E-4737-84D5-892895C86C58", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", matchCriteriaId: "5D7F8F11-1869-40E2-8478-28B4E946D3CC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", matchCriteriaId: "D2019E0E-426B-43AF-8904-1B811AE171E8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", matchCriteriaId: "9062BAB5-D437-49BE-A384-39F62434B70B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", matchCriteriaId: "3BA1504C-14FE-4C21-A801-944041F2946F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", matchCriteriaId: "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", matchCriteriaId: "6E53C673-9D6D-42C8-A502-033E1FC28D97", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", matchCriteriaId: "55C5FC1A-1253-4390-A4FC-573BB14EA937", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", matchCriteriaId: "6F4AC452-6042-409D-8673-ACAD108EE3B5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", matchCriteriaId: "2FE1009B-371A-48E2-A456-935A1F0B7D0D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", matchCriteriaId: "C844A170-B5A7-4703-AF3B-67366D44EA8B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", matchCriteriaId: "44308D13-D935-4FF8-AB52-F0E115ED1AD2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", matchCriteriaId: "3D41CB12-7894-4D25-80EC-23C56171D973", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", matchCriteriaId: "9BCD9C12-EDAB-473F-9CC5-04F06B413720", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", matchCriteriaId: "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", matchCriteriaId: "09789843-6A1A-4CDB-97E8-89E82B79DDB5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", matchCriteriaId: "9C001822-FDF8-497C-AC2C-B59A00E9ACD2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", matchCriteriaId: "118211EF-CED7-4EB5-9669-F54C8169D4AE", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", matchCriteriaId: "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", matchCriteriaId: "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", matchCriteriaId: "9A405AE2-ECC4-4BB0-80DD-4736394FB217", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", matchCriteriaId: "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", matchCriteriaId: "B86C77AB-B8FF-4376-9B4E-C88417396F3D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", matchCriteriaId: "E5612FB0-8403-4A7E-B89A-D7BDFAC00078", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", matchCriteriaId: "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", matchCriteriaId: "AFDA151E-E614-4A24-A34D-B6D5309110CC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", matchCriteriaId: "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", matchCriteriaId: "09BFA20B-2F31-4246-8F74-63DF1DB884EE", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", matchCriteriaId: "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", matchCriteriaId: "4AE93D3D-34B4-47B7-A784-61F4479FF5A2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", matchCriteriaId: "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", matchCriteriaId: "9FFD9D1C-A459-47AD-BC62-15631417A32F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", matchCriteriaId: "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", matchCriteriaId: "6E21E50A-A368-4487-A791-87366CC5C86E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", matchCriteriaId: "43E84296-9B5C-4623-A2C4-431D76FC2765", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", matchCriteriaId: "E18328E2-3CB5-4D36-8EA3-77DD909B46A3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", matchCriteriaId: "EF73D76B-FBB8-4D10-8393-9FAF53392A4B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", matchCriteriaId: "F177AE1C-58C2-4575-807C-ABFFC5119FA8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", matchCriteriaId: "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", matchCriteriaId: "3B13D898-C1B6-44B9-8432-7DDB8A380E9E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", matchCriteriaId: "51A612F6-E4EB-4E34-8F55-79E16C74758E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", matchCriteriaId: "5C19B266-8FE7-49ED-8678-2D522257491D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", matchCriteriaId: "15C4D826-A419-45F5-B91C-1445DB480916", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", matchCriteriaId: "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", matchCriteriaId: "8E4BC012-ADE4-468F-9A25-261CD8055694", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", matchCriteriaId: "D8A80E6A-6502-4A33-83BA-7DCC606D79AA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", matchCriteriaId: "0D6428EB-5E1A-41CB-979C-4C9402251D8B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", matchCriteriaId: "2DCA9879-C9F5-475A-8EC9-04D151001C8D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", matchCriteriaId: "0A94132F-4C47-49CC-B03C-8756613E9A38", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", matchCriteriaId: "46A60ED5-1D92-4B40-956F-D1801CAB9039", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", matchCriteriaId: "3F629879-66F0-427B-86D8-D740E0E3F6E8", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*", matchCriteriaId: "67E12F60-B4AF-4EF1-A4AA-5E9F0B8B0690", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:unixware:7.1.3_up:*:*:*:*:*:*:*", matchCriteriaId: "D953B3BB-F054-4FE9-839E-2D8EC5C7973A", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:unixware:7.1.4:*:*:*:*:*:*:*", matchCriteriaId: "059218D3-A3AD-4A10-9AA4-FBB689321D90", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", matchCriteriaId: "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", matchCriteriaId: "1894C542-AA81-40A9-BF47-AE24C93C1ACB", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*", matchCriteriaId: "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*", matchCriteriaId: "3F305CBD-4329-44DE-A85C-DE9FF371425E", vulnerable: true, }, { criteria: "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", matchCriteriaId: "7BF232A9-9E0A-481E-918D-65FC82EF36D8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.", }, ], id: "CVE-2005-0109", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.7, confidentialityImpact: "COMPLETE", integrityImpact: "NONE", vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.6, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.0", }, exploitabilityScore: 1.1, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2005-03-05T05:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2", }, { source: "cve@mitre.org", tags: [ "Mailing List", ], url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2", }, { source: "cve@mitre.org", tags: [ "Permissions Required", ], url: "http://secunia.com/advisories/15348", }, { source: "cve@mitre.org", tags: [ "Permissions Required", ], url: "http://secunia.com/advisories/18165", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory", ], url: "http://securitytracker.com/id?1013967", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1", }, { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.daemonology.net/hyperthreading-considered-harmful/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "http://www.daemonology.net/papers/htt.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/911878", }, { source: "cve@mitre.org", tags: [ "Not Applicable", ], url: "http://www.redhat.com/support/errata/RHSA-2005-476.html", }, { source: "cve@mitre.org", tags: [ "Not Applicable", ], url: "http://www.redhat.com/support/errata/RHSA-2005-800.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12724", }, { source: "cve@mitre.org", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2005/0540", }, { source: "cve@mitre.org", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2005/3002", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://marc.info/?l=freebsd-security&m=110994370429609&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", ], url: "http://marc.info/?l=openbsd-misc&m=110995101417256&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://secunia.com/advisories/15348", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://secunia.com/advisories/18165", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory", ], url: "http://securitytracker.com/id?1013967", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.daemonology.net/hyperthreading-considered-harmful/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.daemonology.net/papers/htt.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/911878", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://www.redhat.com/support/errata/RHSA-2005-476.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Not Applicable", ], url: "http://www.redhat.com/support/errata/RHSA-2005-800.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12724", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2005/0540", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "http://www.vupen.com/english/advisories/2005/3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2009-09-21 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
postfix | postfix | 2.5.5 | |
debian | debian_linux | 6.06 | |
ubuntu | ubuntu_linux | 4.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*", matchCriteriaId: "894002C8-F3C1-4241-96FE-C088BBD0FCED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:6.06:*:*:*:*:*:*:*", matchCriteriaId: "67D47FA7-B5AF-4580-8BA7-8408D98D1F26", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.0:*:*:*:*:*:*:*", matchCriteriaId: "F22916E8-84BE-444D-9B99-199FE8E0F665", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.", }, { lang: "es", value: "El script postfix.postinst en el paquete postfix v2.5.5 de Debian GNU/Linux y Ubuntu permite acceso de escritura al usuario postfix en /var/spool/postfix/pid, permitiendo a usuarios locales dirigir ataques de enlaces simbólicos que sobrescriban ficheros de su elección.", }, ], id: "CVE-2009-2939", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2009-09-21T19:30:00.390", references: [ { source: "cve@mitre.org", url: "http://www.debian.org/security/2011/dsa-2233", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.openwall.com/lists/oss-security/2009/09/18/6", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2011/dsa-2233", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.openwall.com/lists/oss-security/2009/09/18/6", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-59", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.4:*:*:*:*:*:*:*", matchCriteriaId: "82B7EED3-88ED-4959-9B0D-4593F82B482C", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.5.19:*:*:*:*:*:*:*", matchCriteriaId: "9651929E-7E3D-4967-B4EC-BC1D87386A5C", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.12:*:*:*:*:*:*:*", matchCriteriaId: "B03A2FFF-D736-436F-AB01-952C90CC88A6", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.16:*:*:*:*:*:*:*", matchCriteriaId: "686E6850-2FFB-4A83-9BBB-9C4FB456294E", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*", matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*", matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*", matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*", matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "941DD616-2910-4B61-89E5-5DDAE8E930A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.", }, { lang: "es", value: "Desbordamiento de búfer en proxyd de Cyrus IMAP Server 2.2.9 y anteriores, con la opción imapmagicplus establecida, puede permitir a atacantes remotos ejecutar código de su elección, una vulnerabilidad distinta de CAN-2004-1011.", }, ], id: "CVE-2004-1015", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145", }, { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18274", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-11-17 18:18
Modified
2025-04-09 00:30
Severity ?
Summary
Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dcgrendel | vmbuilder | 0.9 | |
ubuntu | ubuntu_linux | 6.06 | |
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 8.04 | |
ubuntu | ubuntu_linux | 8.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:dcgrendel:vmbuilder:0.9:*:*:*:*:*:*:*", matchCriteriaId: "131A9ABC-41B8-42D4-871C-5375D413F1FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*", matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:_nil_:lts:*:*:*:*:*", matchCriteriaId: "3DD8F0EE-8DD3-4399-83E4-AD4FC89A1DCD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*", matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS, and 8.10, when installed as a virtual machine by (1) python-vm-builder or (2) ubuntu-vm-builder in VMBuilder 0.9 in Ubuntu 8.10, have ! (exclamation point) as the default root password, which allows attackers to bypass intended login restrictions.", }, { lang: "es", value: "Ubuntu 6.06 LTS, 7.10, 8.04 LTS y 8.10, cuando está instalado como una máquina virtual por (1) python-vm-builder o (2) ubuntu-vm-builder en VMBuilder 0.9 en Ubuntu 8.10, tiene un ! (signo de exclamación) como la contraseña por defecto de root, lo que permite a atacantes remotos evitar las restricciones de login previstas.", }, ], id: "CVE-2008-5104", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2008-11-17T18:18:48.063", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://secunia.com/advisories/32697", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/32292", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { source: "cve@mitre.org", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://secunia.com/advisories/32697", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/32292", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46881", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-255", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-08-30 22:17
Modified
2025-04-09 00:30
Severity ?
Summary
A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 7.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*", matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information.", }, { lang: "es", value: "Un error de regresión en tcp-wrappers versiones 7.6.dbs-10 y 7.6.dbs-11, podría permitir a atacantes remotos omitir las restricciones de acceso previstas cuando un servicio usa la biblioteca libwrap pero no especifica la información de conexión del servidor.", }, ], id: "CVE-2007-4601", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-08-30T22:17:00.000", references: [ { source: "security@ubuntu.com", url: "http://bugs.debian.org/405342", }, { source: "security@ubuntu.com", url: "http://osvdb.org/40140", }, { source: "security@ubuntu.com", url: "http://secunia.com/advisories/26567", }, { source: "security@ubuntu.com", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-507-1", }, { source: "security@ubuntu.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364", }, { source: "security@ubuntu.com", url: "https://launchpad.net/bugs/135332", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.debian.org/405342", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/40140", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26567", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-507-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36364", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://launchpad.net/bugs/135332", }, ], sourceIdentifier: "security@ubuntu.com", vendorComments: [ { comment: "Not vulnerable. This issue was specific to a patch from Debian project and did not affect versions of tcp_wrappers packages as shipped with Red Hat Enterprise Linux.\n", lastModified: "2007-08-31T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295", vulnerable: true, }, { criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D", vulnerable: true, }, { criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6", vulnerable: true, }, { criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows.", }, ], id: "CVE-2005-3624", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-12-31T05:00:00.000", references: [ { source: "secalert@redhat.com", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Vendor Advisory", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18147", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18334", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18373", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18380", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18414", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18425", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18428", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18436", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18463", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18908", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18913", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19230", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19377", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25729", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-962", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "secalert@redhat.com", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", }, { source: "secalert@redhat.com", url: "https://usn.ubuntu.com/236-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18334", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18373", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18380", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18414", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18425", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18428", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18436", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18463", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18908", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18913", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19230", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19377", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25729", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-962", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/236-1/", }, ], sourceIdentifier: "secalert@redhat.com", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-189", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-15 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
redhat | enterprise_linux | 2.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.1 | |
suse | suse_linux | 9.2 | |
trustix | secure_linux | 2 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*", matchCriteriaId: "39B3D5AE-05A8-433C-98DD-2711423D3FA6", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.", }, ], id: "CVE-2005-0384", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-15T05:00:00.000", references: [ { source: "security@debian.org", url: "http://secunia.com/advisories/20163", }, { source: "security@debian.org", url: "http://secunia.com/advisories/20202", }, { source: "security@debian.org", url: "http://secunia.com/advisories/20338", }, { source: "security@debian.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "security@debian.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "security@debian.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "security@debian.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { source: "security@debian.org", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "security@debian.org", url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { source: "security@debian.org", url: "http://www.securityfocus.com/bid/12810", }, { source: "security@debian.org", tags: [ "Vendor Advisory", ], url: "http://www.trustix.org/errata/2005/0009/", }, { source: "security@debian.org", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "security@debian.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562", }, { source: "security@debian.org", url: "https://usn.ubuntu.com/95-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.novell.com/linux/security/advisories/2005_18_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/12810", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.trustix.org/errata/2005/0009/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9562", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/95-1/", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.4:*:*:*:*:*:*:*", matchCriteriaId: "82B7EED3-88ED-4959-9B0D-4593F82B482C", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:1.5.19:*:*:*:*:*:*:*", matchCriteriaId: "9651929E-7E3D-4967-B4EC-BC1D87386A5C", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.12:*:*:*:*:*:*:*", matchCriteriaId: "B03A2FFF-D736-436F-AB01-952C90CC88A6", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.0.16:*:*:*:*:*:*:*", matchCriteriaId: "686E6850-2FFB-4A83-9BBB-9C4FB456294E", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*", matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*", matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*", matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*", matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "941DD616-2910-4B61-89E5-5DDAE8E930A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.", }, { lang: "es", value: "Error de fuera-por-uno en la función myasl_canon_user en Cyrus IMAP Server 2.2.9 y anteriores conduce a un desbordamiento de búfer, lo que puede permitir a atacantes remotos ejecutar código de su elección mediante el nombre de usuario.", }, ], id: "CVE-2004-1067", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11738", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-37-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11738", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18333", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-37-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-04-06 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "C4AD30B9-8FBA-48B3-B2B2-014C950B9BAA", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:ppc:*:*:*:*:*", matchCriteriaId: "279317B9-AF2F-43E9-BEE5-518FC6D23A87", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*", matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*", matchCriteriaId: "77FF1412-A7DA-4669-8AE1-5A529AB387FB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*", matchCriteriaId: "AFADBA5A-8168-40B8-B5CA-0F1F7F9193D2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*", matchCriteriaId: "13B6DE5F-3143-4C63-8D8D-4679CF0F9DC8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client_workstation:*:*:*:*:*", matchCriteriaId: "50988CF6-07E5-44BA-81C2-C33DD8E7151B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*", matchCriteriaId: "B1CB2DD9-E77F-46EE-A145-F87AD10EA8E4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia32:*:*:*:*:*", matchCriteriaId: "49F400D5-4CA7-4F7D-818B-DEBF58DEB113", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*", matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*", matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*", matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*", matchCriteriaId: "A2B66383-4124-4579-BC8E-36DBE7ABB543", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", matchCriteriaId: "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.", }, { lang: "es", value: "Desbordamiento de entero en la función FontFileInitTable en X.Org libXfont versiones anteriores a 20070403 permite a usuarios remotos autenticados ejecutar código de su elección mediante una primera línea larga en el fichero fonts.dir, lo cual resulta en un desbordamiento de montón.", }, ], evaluatorSolution: "The vendor has addressed this vulnerability in the following product update: http://xorg.freedesktop.org/archive/X11R7.2/patches/", id: "CVE-2007-1352", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 3.8, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:M/Au:S/C:N/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.4, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-04-06T01:19:00.000", references: [ { source: "secalert@redhat.com", url: "http://issues.foresightlinux.org/browse/FL-223", }, { source: "secalert@redhat.com", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502", }, { source: "secalert@redhat.com", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { source: "secalert@redhat.com", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { source: "secalert@redhat.com", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24741", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24745", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/24756", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24758", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24765", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/24770", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24771", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24772", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24791", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25004", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25006", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25195", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25216", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25305", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/33937", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { source: "secalert@redhat.com", url: "http://support.apple.com/kb/HT3438", }, { source: "secalert@redhat.com", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2007/dsa-1294", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { source: "secalert@redhat.com", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { source: "secalert@redhat.com", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { source: "secalert@redhat.com", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/23283", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/23300", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id?1017857", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/usn-448-1", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/1217", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/1548", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419", }, { source: "secalert@redhat.com", url: "https://issues.rpath.com/browse/RPL-1213", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://issues.foresightlinux.org/browse/FL-223", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=502", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24741", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24745", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/24756", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24758", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24765", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/24770", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24771", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24791", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25195", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25216", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25305", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/33937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.apple.com/kb/HT3438", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2007/dsa-1294", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23300", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1017857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-448-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-1213", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10523", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13243", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openpkg | openpkg | 2.1 | |
openpkg | openpkg | 2.2 | |
openpkg | openpkg | current | |
squid | squid | 2.0_patch2 | |
squid | squid | 2.1_patch2 | |
squid | squid | 2.3_.stable4 | |
squid | squid | 2.3_.stable5 | |
squid | squid | 2.4 | |
squid | squid | 2.4_.stable2 | |
squid | squid | 2.4_.stable6 | |
squid | squid | 2.4_.stable7 | |
squid | squid | 2.5_.stable1 | |
squid | squid | 2.5_.stable3 | |
squid | squid | 2.5_.stable4 | |
squid | squid | 2.5_.stable5 | |
squid | squid | 2.5_.stable6 | |
squid | squid | 3.0_pre1 | |
squid | squid | 3.0_pre2 | |
squid | squid | 3.0_pre3 | |
gentoo | linux | * | |
redhat | fedora_core | core_2.0 | |
trustix | secure_linux | 1.5 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.0_patch2:*:*:*:*:*:*:*", matchCriteriaId: "E0AA7680-E004-44AC-9AE9-C0186459C4B4", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.1_patch2:*:*:*:*:*:*:*", matchCriteriaId: "05A4829D-4DC1-4CD2-B136-48719A254EA9", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.3_.stable4:*:*:*:*:*:*:*", matchCriteriaId: "9A6BFB6A-0AFC-4E52-AD48-252E741B683B", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.3_.stable5:*:*:*:*:*:*:*", matchCriteriaId: "F9797A37-FD26-4527-B2FA-E458F7A88D9B", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.4:*:*:*:*:*:*:*", matchCriteriaId: "540AA8A9-A4AB-4DB2-B37E-11876348DF3A", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.4_.stable2:*:*:*:*:*:*:*", matchCriteriaId: "C8F697BB-5C94-42CD-AD9E-72C3D3675D27", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.4_.stable6:*:*:*:*:*:*:*", matchCriteriaId: "CE764CDC-1018-4502-8F41-8A48E38E7AAF", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.4_.stable7:*:*:*:*:*:*:*", matchCriteriaId: "6CBAAC5B-6012-410F-B765-689A8D55B095", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.5_.stable1:*:*:*:*:*:*:*", matchCriteriaId: "62C66D46-D3C7-4FCC-B80D-EBA542E77C13", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.5_.stable3:*:*:*:*:*:*:*", matchCriteriaId: "B0B6C02F-D194-4CA7-9DEC-A436A4E8C99C", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.5_.stable4:*:*:*:*:*:*:*", matchCriteriaId: "8B7D86CB-EEAD-4C40-855D-E98E4ED8B58F", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.5_.stable5:*:*:*:*:*:*:*", matchCriteriaId: "1F59C3E7-0AC0-4886-B4B4-56904AC93C55", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:2.5_.stable6:*:*:*:*:*:*:*", matchCriteriaId: "5207FB50-946A-4AB2-AED9-9BA78B88F1F3", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:3.0_pre1:*:*:*:*:*:*:*", matchCriteriaId: "CF89643B-169C-4ECD-B905-F4FE7F37030D", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:3.0_pre2:*:*:*:*:*:*:*", matchCriteriaId: "631B754D-1EB0-4A64-819A-5A24E7D0ADFD", vulnerable: true, }, { criteria: "cpe:2.3:a:squid:squid:3.0_pre3:*:*:*:*:*:*:*", matchCriteriaId: "95AB69CF-AD54-4D30-A9C5-4253855A760F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.", }, ], id: "CVE-2004-0918", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-27T05:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt", }, { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923", }, { source: "cve@mitre.org", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30914", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30967", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml", }, { source: "cve@mitre.org", url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-591.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11385", }, { source: "cve@mitre.org", url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", }, { source: "cve@mitre.org", url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/1969/references", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=109913064629327&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30914", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/30967", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-591.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.squid-cache.org/Advisories/SQUID-2004_3.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.squid-cache.org/Advisories/SQUID-2008_1.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2008/1969/references", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17688", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00122.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.2 | |
linux | linux_kernel | 2.6.3 | |
linux | linux_kernel | 2.6.4 | |
linux | linux_kernel | 2.6.5 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.9 | |
linux | linux_kernel | 2.6.10 | |
linux | linux_kernel | 2.6_test9_cvs | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", }, { lang: "es", value: "Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline.", }, ], id: "CVE-2004-1058", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.2, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { source: "cve@mitre.org", url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18684", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19038", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19369", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19607", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/21476", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1018", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/11052", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11937", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/38-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18684", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19038", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19369", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19607", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/21476", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1018", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2006-0190.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2006-0191.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/11052", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17151", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/38-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.", }, ], id: "CVE-2004-0888", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-27T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-573", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-581", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-599", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-543.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-592.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-066.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-354.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11501", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-9-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000886", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110815379627883&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-573", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-581", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-599", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:114", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:115", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:116", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-543.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-592.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-066.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-354.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11501", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2353", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9714", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-9-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", matchCriteriaId: "E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*", matchCriteriaId: "6060C8CB-1592-479E-86AD-AC180F855BD7", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*", matchCriteriaId: "A6DAA88C-BADD-405A-9E66-5B0839595A70", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*", matchCriteriaId: "04D5E3B7-5377-4CA8-BA0D-056870CB717E", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*", matchCriteriaId: "22C11931-B594-43EC-9698-7152B1DF8CA3", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*", matchCriteriaId: "976B5923-1BCC-4DE6-A904-930DD833B937", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "D5452DF1-0270-452D-90EB-45E9A084B94C", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*", matchCriteriaId: "CBFD12E6-F92E-4371-ADA7-BCD41E4C9014", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*", matchCriteriaId: "67FDF4FB-06FA-4A10-A3CF-F52169BC8072", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*", matchCriteriaId: "A5B29018-B495-482A-8FF7-66821A178F9A", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*", matchCriteriaId: "38718561-70C7-4E0D-9313-87A5E82ED338", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*", matchCriteriaId: "D057064A-9B34-4224-97BA-4D5840A92BE0", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*", matchCriteriaId: "E3C297DC-69B1-4BE6-A5EF-D320BD0CA968", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*", matchCriteriaId: "2F4C1FFB-F6AA-4DED-9C54-DCB274F59A44", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*", matchCriteriaId: "338A92AC-92D2-40BF-9FAC-884AF6F74D55", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*", matchCriteriaId: "26DB5610-03CE-425E-8855-70D5787029FE", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*", matchCriteriaId: "C5DFC86C-7743-4F27-BC10-170F04C23D7B", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*", matchCriteriaId: "F5170421-BA0C-4365-9CD6-BD232EA08680", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*", matchCriteriaId: "5909AAA4-4AF9-4D23-87C5-5D7787909B02", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2170CFD0-2594-45FB-B68F-0A75114F00A8", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*", matchCriteriaId: "03C07744-CAE8-44C6-965E-2A09BAE1F36C", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*", matchCriteriaId: "B17E0E59-C928-49AB-BAA7-4AE638B376D1", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*", matchCriteriaId: "294FC65B-4225-475A-B49A-758823CEDECD", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*", matchCriteriaId: "6156B085-AA17-458C-AED1-D658275E43B9", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*", matchCriteriaId: "B6419309-385F-4525-AD4B-C73B1A3ED935", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*", matchCriteriaId: "51F7E821-2908-47F1-9665-E9D68ECC242F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "sudo before 1.6.8p2 allows local users to execute arbitrary commands by using \"()\" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.", }, ], id: "CVE-2004-1051", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-01T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-596", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11668", }, { source: "cve@mitre.org", url: "http://www.sudo.ws/sudo/alerts/bash_functions.html", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2004/0061/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-28-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110028877431192&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110598298225675&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-596", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:133", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11668", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.sudo.ws/sudo/alerts/bash_functions.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2004/0061/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18055", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-28-1/", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "We do not consider this to be a security issue:\nhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1", lastModified: "2006-08-30T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | realtime_linux_security_module | 0.8.7 | |
conectiva | linux | 10.0 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:realtime_linux_security_module:0.8.7:*:*:*:*:*:*:*", matchCriteriaId: "5D5094E9-4464-471D-AA5E-E4B4B7A7F1CC", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.", }, ], id: "CVE-2004-1337", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-12-23T05:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12093", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110384535113035&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12093", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18673", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.", }, ], id: "CVE-2004-0889", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-27T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/11501", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=109880927526773&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-30.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:113", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/11501", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17819", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 3.0 | |
gentoo | linux | * | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux_desktop | 4.0 | |
ubuntu | ubuntu_linux | 4.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:woody:*:*:*:*:*", matchCriteriaId: "436B1E58-17E8-495B-A2DD-FB1626B9D35B", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.", }, ], id: "CVE-2005-0077", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-05-02T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/14015", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/14050", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1013007", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2005/dsa-658", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-072.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/12360", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110667936707597&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/14015", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/14050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1013007", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2005/dsa-658", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:030", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-072.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/426530/30/6600/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/12360", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19068", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10552", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-10-29 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 7.10 | |
compiz | compiz | * | |
gnome | screensaver | 2.20 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:amd64:*:*:*:*:*", matchCriteriaId: "FB928CC9-0BC3-4AE1-B20B-A58A4C4AAE24", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:i386:*:*:*:*:*", matchCriteriaId: "BB850565-A800-44A6-945E-CB235531C5DD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "3F37A796-E028-4247-A5E6-66B89A583F87", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:sparc:*:*:*:*:*", matchCriteriaId: "61DA44B7-FE1A-4452-843E-EAF1404B86F3", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:compiz:compiz:*:*:*:*:*:*:*:*", matchCriteriaId: "93384956-31D4-4111-B447-A6710A8A6306", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:screensaver:2.20:*:*:*:*:*:*:*", matchCriteriaId: "F784A89F-6759-4801-B00F-502EE8AD4E71", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "GNOME screensaver 2.20 in Ubuntu 7.10, when used with Compiz, does not properly reserve input focus, which allows attackers with physical access to take control of the session after entering an Alt-Tab sequence, a related issue to CVE-2007-3069.", }, { lang: "es", value: "El salvapantallas 2.20 de GNOME en Ubuntu 7.10, cuando se usa con Compiz, no reserva el foco de entrada apropiadamente, lo cual permite a atacantes remotos con acceso físico tomar el control de la sesión después de haber introducido la secuencia Alt-Tab, tema similar a CVE-2007-3069.", }, ], id: "CVE-2007-3920", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-10-29T21:46:00.000", references: [ { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/27381", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28627", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30329", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/30715", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/26188", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-537-1", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-537-2", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/27381", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28627", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30715", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2008-0485.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/26188", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-537-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-537-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=357071", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=363061", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37410", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10192", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00811.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00841.html", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "This issue affected Red Hat Enterprise Linux 5 with a low security impact. An update to the compiz package was released to correct this issue: \nhttps://rhn.redhat.com/errata/RHSA-2008-0485.html\n\n", lastModified: "2008-05-21T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2004-12-23 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "146F7A77-A950-4CAD-BDA9-C239696F569D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", matchCriteriaId: "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "70DCE8FF-40C3-44F7-8185-0422ADDA051B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "7DAC3A7C-2092-46D4-908B-CF03F4217112", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "5A6F3945-21ED-44C6-86D2-B7755A87014E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "A5DDB008-E88E-473C-B030-AF9B6F5E4E48", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", matchCriteriaId: "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", matchCriteriaId: "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", matchCriteriaId: "0EEF4480-D50B-464C-AE39-A12455DBC99F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", matchCriteriaId: "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", matchCriteriaId: "15928E10-7D41-45B2-87D6-8AA10190A8EB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", matchCriteriaId: "C18E13C4-F42D-4168-B25E-544E1549C46B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", matchCriteriaId: "1C4B2ABB-0283-4532-9E29-B37BFF5FDFB7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*", matchCriteriaId: "C4DADA29-DCD3-44C4-9BDB-B881D6FCE3A3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", matchCriteriaId: "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", matchCriteriaId: "4BD794C6-11F5-4A2B-9A3C-E03069A1526B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", matchCriteriaId: "C4947CDE-CB89-456B-8B5F-0E17B46BC893", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", matchCriteriaId: "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", matchCriteriaId: "BF701E58-35E8-4DDE-B832-C5A23E61A3CA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", matchCriteriaId: "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", matchCriteriaId: "2498D898-D243-4D0C-9AEF-0138D19A68B9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", matchCriteriaId: "3924060B-1EC1-4003-B306-E327634E7797", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", matchCriteriaId: "D45B43DF-FD4C-4C37-9569-1CCE450B8987", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", matchCriteriaId: "99879B2B-7FFB-4181-8928-13B7E17F36C6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*", matchCriteriaId: "83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.", }, { lang: "es", value: "Múltiples condiciones de carrera en la capa de terminal de Linux kernel 2.4.x y 2.6.x anteriores a 2.6.9 permiten a \r\n usuarios locales obtener porciones de datos del kernel mediante una llamada ioctl TIOCSETD a una interfaz de terminal que esté siendo accedida por otro hilo, o a \r\n atacantes remotos causar una denegación de servicio (panic) cambiando de consola a disciplina de línea PPP, y enviando entonces inmediatamente datos que son recibidos durante la conmutación.", }, ], id: "CVE-2004-0814", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 1.2, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-12-23T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", }, { source: "cve@mitre.org", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/379005", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11491", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11492", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/379005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11491", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11492", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17816", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-05-03 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 5.04 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:*:*:*:*:*:*", matchCriteriaId: "5D74EB99-6C5C-46C7-9DE6-9292102DD2DC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.", }, ], id: "CVE-2005-0106", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-05-03T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/18639", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/13471", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/113-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18639", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/13471", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/113-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.2 | |
linux | linux_kernel | 2.6.3 | |
linux | linux_kernel | 2.6.4 | |
linux | linux_kernel | 2.6.5 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.9 | |
linux | linux_kernel | 2.6.10 | |
linux | linux_kernel | 2.6_test9_cvs | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.", }, ], id: "CVE-2004-1151", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079", }, { source: "cve@mitre.org", url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "cve@mitre.org", url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://linux.bkbits.net:8080/linux-2.6/cset%401.2079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-01-09 23:03
Modified
2025-04-03 01:03
Severity ?
Summary
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*", matchCriteriaId: "6060C8CB-1592-479E-86AD-AC180F855BD7", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*", matchCriteriaId: "A6DAA88C-BADD-405A-9E66-5B0839595A70", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*", matchCriteriaId: "04D5E3B7-5377-4CA8-BA0D-056870CB717E", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*", matchCriteriaId: "22C11931-B594-43EC-9698-7152B1DF8CA3", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*", matchCriteriaId: "976B5923-1BCC-4DE6-A904-930DD833B937", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "D5452DF1-0270-452D-90EB-45E9A084B94C", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*", matchCriteriaId: "CBFD12E6-F92E-4371-ADA7-BCD41E4C9014", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*", matchCriteriaId: "67FDF4FB-06FA-4A10-A3CF-F52169BC8072", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*", matchCriteriaId: "A5B29018-B495-482A-8FF7-66821A178F9A", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*", matchCriteriaId: "38718561-70C7-4E0D-9313-87A5E82ED338", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*", matchCriteriaId: "D057064A-9B34-4224-97BA-4D5840A92BE0", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*", matchCriteriaId: "E3C297DC-69B1-4BE6-A5EF-D320BD0CA968", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*", matchCriteriaId: "2F4C1FFB-F6AA-4DED-9C54-DCB274F59A44", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*", matchCriteriaId: "338A92AC-92D2-40BF-9FAC-884AF6F74D55", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*", matchCriteriaId: "26DB5610-03CE-425E-8855-70D5787029FE", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*", matchCriteriaId: "C5DFC86C-7743-4F27-BC10-170F04C23D7B", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*", matchCriteriaId: "F5170421-BA0C-4365-9CD6-BD232EA08680", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*", matchCriteriaId: "5909AAA4-4AF9-4D23-87C5-5D7787909B02", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2170CFD0-2594-45FB-B68F-0A75114F00A8", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*", matchCriteriaId: "03C07744-CAE8-44C6-965E-2A09BAE1F36C", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*", matchCriteriaId: "B17E0E59-C928-49AB-BAA7-4AE638B376D1", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*", matchCriteriaId: "294FC65B-4225-475A-B49A-758823CEDECD", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*", matchCriteriaId: "6156B085-AA17-458C-AED1-D658275E43B9", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*", matchCriteriaId: "1C898BE7-506D-49DA-8619-F86C7A9FE902", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*", matchCriteriaId: "B6419309-385F-4525-AD4B-C73B1A3ED935", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*", matchCriteriaId: "51F7E821-2908-47F1-9665-E9D68ECC242F", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*", matchCriteriaId: "C90D0AB4-F8A8-4301-99B5-757254FA999A", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*", matchCriteriaId: "A79C7098-37D0-4E6E-A22C-3C771D81956F", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*", matchCriteriaId: "BB7D2832-B654-406E-AA34-B3BD1D6F0A2A", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*", matchCriteriaId: "D5688D95-89EF-4D2E-9728-2316CAC3CBE6", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*", matchCriteriaId: "B69E49B2-1B3C-4434-ACF1-CF4F519E3C32", vulnerable: true, }, { criteria: "cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*", matchCriteriaId: "31B2C299-5D0B-44DA-91FD-4B1146BE9A7B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.", }, ], id: "CVE-2006-0151", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-01-09T23:03:00.000", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18358", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18363", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18549", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18558", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18906", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19016", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/21692", }, { source: "cve@mitre.org", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-946", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/16184", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2006/0010", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/235-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18358", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18363", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18549", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18558", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18906", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19016", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/21692", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-946", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:159", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2006_02_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.securityfocus.com/bid/16184", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2006/0010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/235-2/", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "We do not consider this to be a security issue.\nhttp:bugzilla.redhat.combugzillashow_bug.cgi?id=139478#c1", lastModified: "2008-01-24T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-02-07 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
larry_wall | perl | 5.8.0 | |
larry_wall | perl | 5.8.1 | |
larry_wall | perl | 5.8.3 | |
larry_wall | perl | 5.8.4 | |
larry_wall | perl | 5.8.4.1 | |
larry_wall | perl | 5.8.4.2 | |
larry_wall | perl | 5.8.4.2.3 | |
larry_wall | perl | 5.8.4.3 | |
larry_wall | perl | 5.8.4.4 | |
larry_wall | perl | 5.8.4.5 | |
sgi | propack | 3.0 | |
ibm | aix | 5.2 | |
ibm | aix | 5.3 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux | 3.0 | |
redhat | enterprise_linux_desktop | 3.0 | |
redhat | fedora_core | core_3.0 | |
suse | suse_linux | 8.0 | |
suse | suse_linux | 8.0 | |
suse | suse_linux | 8.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.1 | |
suse | suse_linux | 9.2 | |
trustix | secure_linux | 1.5 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", matchCriteriaId: "3D30E072-9E6A-49B4-A5C7-63A328598A68", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*", matchCriteriaId: "434F0580-985F-42AF-BA10-FAB7E2C23ED0", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*", matchCriteriaId: "18B179E0-C843-46C9-AAD2-78E998175E41", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*", matchCriteriaId: "AD5E5A51-ED4C-4927-8C4D-502E79391E19", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*", matchCriteriaId: "171C82CB-2E92-4D41-B1B1-DCFE929E8270", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*", matchCriteriaId: "25633253-D9DE-41F0-A787-D0E8B2B3B9F0", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*", matchCriteriaId: "AEDF9611-E4E2-4059-B45E-D3A61AC9DB47", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*", matchCriteriaId: "49A9D197-D889-4BE4-BE7A-2EE9536A7498", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*", matchCriteriaId: "D0A4538C-3870-431E-A225-D8523D77A4E4", vulnerable: true, }, { criteria: "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*", matchCriteriaId: "C8233B3A-E09D-425B-B1A1-65CD170FD384", vulnerable: true, }, { criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", matchCriteriaId: "17EECCCB-D7D1-439A-9985-8FAE8B44487B", vulnerable: true, }, { criteria: "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", matchCriteriaId: "EA8DDF4A-1C5D-4CB1-95B3-69EAE6572507", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.", }, ], id: "CVE-2005-0156", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-02-07T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", }, { source: "cve@mitre.org", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/14120", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/55314", }, { source: "cve@mitre.org", url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-103.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-105.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12426", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.trustix.org/errata/2005/0003/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://fedoranews.org/updates/FEDORA--.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110737149402683&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/14120", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/55314", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-103.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-105.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12426", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.trustix.org/errata/2005/0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2004-09-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*", matchCriteriaId: "AC774637-8B95-4C69-8665-86A67EAEBB24", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*", matchCriteriaId: "9928B65C-A2F3-4D95-9A73-6DE4415463B6", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*", matchCriteriaId: "072BDD6E-D815-4996-B78C-42502FB8BE05", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*", matchCriteriaId: "AE9D28DB-FFC6-4C7F-89F6-85740B239271", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*", matchCriteriaId: "988CDE52-220B-489D-9644-94CC5274E678", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*", matchCriteriaId: "B49B4277-ECFD-4568-94C1-6E02BF238A2D", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*", matchCriteriaId: "882A873F-D3D3-4E11-9C6B-B45C53672711", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*", matchCriteriaId: "8DA760F0-EFA2-4B4E-BB95-8FD857CD3250", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*", matchCriteriaId: "1C72DEC7-5558-4121-89CE-6E9B382C849E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*", matchCriteriaId: "6880B01C-0804-4CCF-9916-89807BBD4C8B", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*", matchCriteriaId: "1FE16231-4FB4-4D30-BE83-AD400E357280", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*", matchCriteriaId: "27937897-40B1-4D86-AFF0-ACA1B7F7A33E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*", matchCriteriaId: "A533869A-BAF1-4A26-AD33-0C4B6A62AA65", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*", matchCriteriaId: "917A16B8-65F3-4C5D-904E-DD0FBD46A3F2", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*", matchCriteriaId: "89F6F148-15BA-4F07-A7A6-457B54FB234E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*", matchCriteriaId: "7E1CF072-E421-4BAA-9B29-421B101171B7", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "630D2700-3AF2-4F6C-B045-41571B602B86", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*", matchCriteriaId: "1750F261-8A88-4C9C-A86B-ED1D6F41C408", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*", matchCriteriaId: "7606397B-A6F0-41AA-8DA2-B3ECBC7374EB", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "F69E5CC4-422F-4E4C-8E4C-8EA3479D759E", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*", matchCriteriaId: "3B6EC79E-A937-4781-AF55-35BCB2247C52", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*", matchCriteriaId: "A3DCF542-ABD1-448A-BD6F-F3FB4DB957C8", vulnerable: true, }, { criteria: "cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "B6A7F9B2-116C-4AB8-98B0-729D0AB8545E", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*", matchCriteriaId: "0D83FADC-4C7F-4C16-BBAA-9883D7449744", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*", matchCriteriaId: "B45B5EE8-00FB-46FE-9A26-7468AD30B540", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*", matchCriteriaId: "6534A963-C0A7-47D6-8E1B-B8D0F3933428", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*", matchCriteriaId: "1FD06A99-7CBF-4593-9EA1-5D1A800D8C38", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*", matchCriteriaId: "8BDC9494-E79B-4497-8413-A44DF326ABB1", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "563F49AC-D60F-4E00-9E0D-7EDAA2FFFCD0", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "9BDB0628-9BFD-4262-886C-E971EC262134", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*", matchCriteriaId: "F4CEEBE6-7CE6-4E1B-8828-EDD64EA3A338", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*", matchCriteriaId: "193A610A-5E5E-4A87-A501-902100D1C2AF", vulnerable: true, }, { criteria: "cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*", matchCriteriaId: "46F682CD-0117-4770-877F-1F3903BAFE04", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*", matchCriteriaId: "F5537D6C-7700-4818-93F7-4449049DF131", vulnerable: true, }, { criteria: "cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*", matchCriteriaId: "A1587AB3-180E-4734-A0AC-4EE5A93B469A", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:desktop_10.0:*:*:*:*:*:*:*", matchCriteriaId: "49A34783-39EF-471A-9B8B-72CBF2BB3E30", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:server_7.0:*:*:*:*:*:*:*", matchCriteriaId: "42FB8BA2-8651-4806-9172-0E03F6B7AAD3", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:server_8.0:*:*:*:*:*:*:*", matchCriteriaId: "79B0F1A4-BE4C-4A33-B1F5-9C158B228D82", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:workstation_7.0:*:*:*:*:*:*:*", matchCriteriaId: "EE73E6EB-6712-4DD8-847B-67CCA9A8E0A7", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:workstation_8.0:*:*:*:*:*:*:*", matchCriteriaId: "1066BFAC-0156-4440-A32B-BC1B5228DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.", }, ], id: "CVE-2004-0827", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2004-09-16T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/28800", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-547", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-480.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-494.html", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/0412", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28800", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-231321-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-201006-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-547", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-480.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-494.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/0412", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17173", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11123", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*", matchCriteriaId: "361D407D-A4BE-491D-BC8E-32E78DC4A8F0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", matchCriteriaId: "2CDE1E92-C64D-4A3B-95A2-384BD772B28B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", matchCriteriaId: "9D90502F-EC45-4ADC-9428-B94346DA660B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i686:*:*:*:*:*", matchCriteriaId: "05853955-CA81-40D3-9A70-1227F3270D3C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*", matchCriteriaId: "A7D073E9-E535-4B36-BEF2-8499536E37DA", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.", }, ], id: "CVE-2005-0750", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-27T05:00:00.000", references: [ { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html", }, { source: "secalert@redhat.com", url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/12911", }, { source: "secalert@redhat.com", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=111204562102633&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-283.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-284.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-293.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-366.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/12911", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19844", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11719", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bogofilter | email_filter | 0.9.0.3 | |
bogofilter | email_filter | 0.9.0.4 | |
bogofilter | email_filter | 0.9.0.5 | |
bogofilter | email_filter | 0.92 | |
bogofilter | email_filter | 0.92.4 | |
bogofilter | email_filter | 0.92.6 | |
bogofilter | email_filter | 0.92.7 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.3:*:*:*:*:*:*:*", matchCriteriaId: "4219CFEB-559A-473D-BE6B-86A9FCA2C653", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.4:*:*:*:*:*:*:*", matchCriteriaId: "925D3591-4D0E-48A7-85B3-186A44775648", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.9.0.5:*:*:*:*:*:*:*", matchCriteriaId: "1EA9F713-AFF9-4246-BEF6-3F878D4859F3", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.92:*:*:*:*:*:*:*", matchCriteriaId: "4920DD7B-1345-4BB7-8E34-9A19FDEE4A17", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.4:*:*:*:*:*:*:*", matchCriteriaId: "8C69E15B-BD2E-4CD4-B0C1-27080C378CDA", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.6:*:*:*:*:*:*:*", matchCriteriaId: "29F61AE7-DD1E-40C7-A068-3544EE529BFF", vulnerable: true, }, { criteria: "cpe:2.3:o:bogofilter:email_filter:0.92.7:*:*:*:*:*:*:*", matchCriteriaId: "D91F10AC-9857-439B-869A-11B7A6ECE515", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The quoted-printable decoder in bogofilter 0.17.4 to 0.92.7 allows remote attackers to cause a denial of service (application crash) via mail headers that cause a line feed (LF) to be replaced by a null byte that is written to an incorrect memory address.", }, ], id: "CVE-2004-1007", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-01T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bogofilter.sourceforge.net/security/bogofilter-SA-2004-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17916", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-11-17 18:18
Modified
2025-04-09 00:30
Severity ?
Summary
The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dcgrendel | vmbuilder | 0.9 | |
ubuntu | ubuntu_linux | 6.06 | |
ubuntu | ubuntu_linux | 7.10 | |
ubuntu | ubuntu_linux | 8.04 | |
ubuntu | ubuntu_linux | 8.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:dcgrendel:vmbuilder:0.9:*:*:*:*:*:*:*", matchCriteriaId: "131A9ABC-41B8-42D4-871C-5375D413F1FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:_nil_:lts:*:*:*:*:*", matchCriteriaId: "8CC514F1-FFCF-4ADD-8A2C-F22C693F9DCF", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.04:_nil_:lts:*:*:*:*:*", matchCriteriaId: "3DD8F0EE-8DD3-4399-83E4-AD4FC89A1DCD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:8.10:*:*:*:*:*:*:*", matchCriteriaId: "ED67B852-4B37-4B79-8F4D-23B2FEACA4ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The (1) python-vm-builder and (2) ubuntu-vm-builder implementations in VMBuilder 0.9 in Ubuntu 8.10 omit the -e option when invoking chpasswd with a root:! argument, which configures the root account with a cleartext password of ! (exclamation point) and allows attackers to bypass intended login restrictions.", }, { lang: "es", value: "Las implementaciones (1) python-vm-builder y (2) ubuntu-vm-builder en VMBuilder v0.9 en Ubuntu v8.10 omiten la opción -e cuando invocan chpasswd con un argumento root:!, lo cual configura la cuenta raíz con una contraseña en texto claro de ! (punto de exclamación) y permite a atacantes evitar restricciones de login intencionadas.", }, ], id: "CVE-2008-5103", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2008-11-17T18:18:48.017", references: [ { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { source: "cve@mitre.org", url: "http://osvdb.org/49996", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/32697", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/32292", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { source: "cve@mitre.org", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://launchpadlibrarian.net/19619929/vm-builder_0.9-0ubuntu3.1.debdiff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/49996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/32697", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/32292", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.ubuntu.com/usn/usn-670-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugs.launchpad.net/ubuntu/+source/vm-builder/+bug/296841", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46603", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-255", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", }, { lang: "es", value: "Múltiples vulnerabilidades en el sistema de ficheros de samba (smbfs) en los kernel de Linux 2.4 y 2.6 permite a servidores samba remotos causar una denegación de servicio (caída) u obtener información sensible de la memoria del kernel mediante un servidor samba \r\n\r\nque devuelva más datos de los solicitados a la función smb_proc_read\r\nque devuelva un desplazamiento de datos de fuera del paquete samba a la función smb_proc_readX, \r\nque envíe una cierto paquete fragmentado TRANS2 a la función smb_receive_trans2, \r\nque envíe un paquete samba con un cierto tamaño de cabecera a la función smb_proc_readX, o \r\n que envíe un cierto desplazamiento basado en el paquete para los datos en un paquete a la función smb_receive_trans2", }, ], id: "CVE-2004-0883", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.4, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13232/", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20162", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20163", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20202", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20338", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/142004.html", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/726198", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11695", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110072140811965&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110082989725345&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13232/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/142004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/726198", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11695", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18134", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18135", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18136", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10330", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", }, { lang: "es", value: "Un error de \"falta de serialización\" en la función unix_dgram_recvmsg en Linux 2.4.27 y anteriores, y 2.6.x hasta 2.6.9, permite a usurios locales ganar privilegios aprovechando una condición de carrera.", }, ], id: "CVE-2004-1068", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/19607", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20162", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20163", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20202", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20338", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/381689", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11715", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19607", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-504.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-505.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-537.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/381689", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11715", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18230", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11384", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-11-06 17:07
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rpm | package_manager | 4.4.8 | |
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rpm:package_manager:4.4.8:*:*:*:*:*:*:*", matchCriteriaId: "A1CADBE5-0FAA-437F-AB62-B457935938D0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Heap-based buffer overflow in the showQueryPackage function in librpm in RPM Package Manager 4.4.8, when the LANG environment variable is set to ru_RU.UTF-8, might allow user-assisted attackers to execute arbitrary code via crafted RPM packages.", }, { lang: "es", value: "Desbordamiento de búfer basado en montón en la función shoqQueryPackage en librpm en RPM Package Manager 4.4.8, cuando la variable de entorno LANG tiene el valor ru_RU.UTF-8, podría permitir a atacantes con la intervención del usuario ejecutar código de su elección mediante paquetes RPM manipulados.", }, ], evaluatorSolution: "Successful exploitation may allow the execution of arbitrary code, but requires that certain locales are set (e.g. ru_RU.UTF-8).\r\nThere are patches available for each affected Ubuntu product.", id: "CVE-2006-5466", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 5.4, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:H/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2006-11-06T17:07:00.000", references: [ { source: "secalert@redhat.com", tags: [ "Exploit", "Vendor Advisory", ], url: "http://secunia.com/advisories/22740", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/22745", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/22768", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/22854", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200611-08.xml", }, { source: "secalert@redhat.com", url: "http://securitytracker.com/id?1017160", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/20906", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-378-1", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2006/4350", }, { source: "secalert@redhat.com", tags: [ "Exploit", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Vendor Advisory", ], url: "http://secunia.com/advisories/22740", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/22745", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/22768", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/22854", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200611-08.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1017160", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:200", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/20906", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-378-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/4350", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833", }, ], sourceIdentifier: "secalert@redhat.com", vendorComments: [ { comment: "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213515\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nRed Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins."
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*", matchCriteriaId: "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*", matchCriteriaId: "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23:*:*:*:*:*:*:*", matchCriteriaId: "C116493B-2837-4531-9291-A9FF03099A97", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.23_rc1:*:*:*:*:*:*:*", matchCriteriaId: "525BD04B-387F-4713-BC89-472D0D0BCFD0", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.2:*:*:*:*:*:*:*", matchCriteriaId: "6BF92649-90CE-4E75-A938-61D0916B5A7E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kdegraphics:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "2CA505B4-0C17-49C8-9533-CA8CE3AA77D8", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4:*:*:*:*:*:*:*", matchCriteriaId: "37C08E0A-651F-458B-BCEC-A30DCD527E47", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6000D6AF-C056-4BC0-A54C-72E23E52AB92", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "A7D036E4-FA49-417D-968B-9D73B16A09BA", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.4.3:*:*:*:*:*:*:*", matchCriteriaId: "BC2AB9CB-DEAB-45AB-A7CA-D19E069907EC", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kword:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "EAC32BAA-99B3-4B40-83A3-ED9E1B12B295", vulnerable: true, }, { criteria: "cpe:2.3:a:libextractor:libextractor:*:*:*:*:*:*:*:*", matchCriteriaId: "679D9520-DE8E-4D06-A227-3B1C1D05977D", vulnerable: true, }, { criteria: "cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*", matchCriteriaId: "63C92F1C-3005-4EA6-B9C0-2BC2E3D611D6", vulnerable: true, }, { criteria: "cpe:2.3:a:sgi:propack:3.0:sp6:*:*:*:*:*:*", matchCriteriaId: "EF8ABD90-AD2B-4FA0-A355-9D7CD6D3C486", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:3.0:*:*:*:*:*:*:*", matchCriteriaId: "9178B36F-41D5-4AE7-B9C8-56BDEADE76EB", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*", matchCriteriaId: "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*", matchCriteriaId: "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*", matchCriteriaId: "5EACF214-FA27-44FF-A431-927AB79377A1", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*", matchCriteriaId: "E2B58895-0E2A-4466-9CB2-0083349A83B2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*", matchCriteriaId: "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*", matchCriteriaId: "2311919C-7864-469D-B0F6-9B11D8D0A1C3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*", matchCriteriaId: "19876495-4C1A-487C-955A-C5AA46362A1F", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*", matchCriteriaId: "D75286DD-50BC-4B72-8AC8-E20730124DC2", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*", matchCriteriaId: "1998C972-497E-4916-B50E-FB32303EEA8E", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*", matchCriteriaId: "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*", matchCriteriaId: "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*", matchCriteriaId: "08E90AFA-C262-46D0-B60E-26B67C9602D5", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86-64:*:*:*:*:*", matchCriteriaId: "0315FB43-D199-4734-B724-50ED031C0020", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "11D69B83-4EF3-407B-8E8C-DE623F099C17", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.2:*:x86-64:*:*:*:*:*", matchCriteriaId: "7D221688-18A0-453D-8D13-6B68011FCA13", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*", matchCriteriaId: "597094EC-D23F-4EC4-A140-96F287679124", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:*", matchCriteriaId: "C4FCF0D3-A6CB-448E-B0D3-DA82BE02DEC8", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_4.0:*:*:*:*:*:*:*", matchCriteriaId: "C720DACC-CF4B-4A00-818C-8303A7D7DED6", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:5.0.7:*:*:*:*:*:*:*", matchCriteriaId: "D9D76A8D-832B-411E-A458-186733C66010", vulnerable: true, }, { criteria: "cpe:2.3:o:sco:openserver:6.0:*:*:*:*:*:*:*", matchCriteriaId: "7458BA31-812E-40C9-BB92-8688A3BCBA56", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "B85EF0EE-3E61-4CA3-9F00-610AB2E1CFCF", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.2:*:*:*:*:*:*:*", matchCriteriaId: "70440F49-AEE9-41BE-8E1A-43AB657C8E09", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:personal:*:*:*:*:*", matchCriteriaId: "F239BA8A-6B41-4B08-8C7C-25D235812C50", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:professional:*:*:*:*:*", matchCriteriaId: "89BA858B-9466-4640-84AE-DC5BDC65D6B8", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:s_390:*:*:*:*:*", matchCriteriaId: "85F2D904-E830-4034-9CCB-0FF65019622C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:personal:*:*:*:*:*", matchCriteriaId: "3EA56868-ACA1-4C65-9FFB-A68129D2428A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:professional:*:*:*:*:*", matchCriteriaId: "1BA2E629-58C6-4BA0-A447-F8F570B35E74", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:personal:*:*:*:*:*", matchCriteriaId: "3BEE15E9-9194-4E37-AB3B-66ECD5AC9E11", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:professional:*:*:*:*:*", matchCriteriaId: "C89BA3B6-370B-4911-A363-935A9C9EACF5", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:personal:*:*:*:*:*", matchCriteriaId: "4F1B4D15-0562-44D6-B80B-35A8F432BD41", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:professional:*:*:*:*:*", matchCriteriaId: "D84ABF78-0D85-4E15-907E-B5ACE86EB8C7", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.3:*:x86_64:*:*:*:*:*", matchCriteriaId: "9C7018E7-F90C-435D-A07A-05A294EA2827", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:oss:*:*:*:*:*", matchCriteriaId: "16915004-1006-41D6-9E42-D1A5041E442D", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:10.0:*:professional:*:*:*:*:*", matchCriteriaId: "994ABCE2-3B9E-4E4E-83F7-CE2A79C70F64", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "100A2456-BF20-4461-8DC9-C61889322B29", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:10:*:*:*:*:*:*:*", matchCriteriaId: "1C7D4F57-E186-497A-B390-92E5D2C7E894", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*", matchCriteriaId: "CEC3F6F3-9A6E-4A98-A967-6776C872475C", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting_edition:*:*:*:*:*:*:*", matchCriteriaId: "FC3218DD-A565-4AB8-86FE-E7F59AC0535F", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup_edition:*:*:*:*:*:*:*", matchCriteriaId: "97AEDB57-202F-4B53-8815-21836F177060", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_multimedia:*:*:*:*:*:*:*:*", matchCriteriaId: "E27180A1-9767-4CD3-978C-7538155B162D", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_personal:*:*:*:*:*:*:*:*", matchCriteriaId: "BAAA9376-A060-49AE-86A7-6B28E26ED5D9", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0_x86:*:*:*:*:*:*:*", matchCriteriaId: "EC5AC26E-3F3F-4D14-BE65-82B4432AB382", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka \"Infinite CPU spins.\"", }, ], id: "CVE-2005-3625", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-12-31T05:00:00.000", references: [ { source: "secalert@redhat.com", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18147", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18334", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18335", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18373", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18380", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18414", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18425", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18428", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18436", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18463", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18908", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/18913", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19230", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/19377", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25729", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2006/dsa-962", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "secalert@redhat.com", url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "secalert@redhat.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "secalert@redhat.com", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", }, { source: "secalert@redhat.com", url: "https://usn.ubuntu.com/236-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://rhn.redhat.com/errata/RHSA-2006-0177.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://scary.beasts.org/security/CESA-2005-003.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18147", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18303", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18332", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18334", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18335", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18349", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18373", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18375", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18380", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18385", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18387", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18389", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18398", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18407", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18414", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18416", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18423", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18425", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18428", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18436", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18448", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18463", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18517", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18534", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18554", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/18582", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18642", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18644", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18674", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18675", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18679", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/18908", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18913", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19230", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19377", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25729", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-931", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-932", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-940", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-936", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2006/dsa-961", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-962", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.kde.org/info/security/advisory-20051207-2.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:003", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:005", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:008", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:010", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:011", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:012", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0160.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2006-0163.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427053/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/427990/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/16143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2006/0002/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/0047", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/2280", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24023", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/236-1/", }, ], sourceIdentifier: "secalert@redhat.com", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-03-13 12:18
Modified
2025-04-03 01:03
Severity ?
Summary
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 5.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*", matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.", }, ], id: "CVE-2006-1183", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-03-13T12:18:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/19200", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1015761", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/23868", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/17086", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2006/0927", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", }, { source: "cve@mitre.org", url: "https://usn.ubuntu.com/262-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/19200", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1015761", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/23868", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/17086", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/0927", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/25170", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/262-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-12-14 00:28
Modified
2025-04-09 00:30
Severity ?
Summary
Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 6.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.", }, { lang: "es", value: "Ubuntu Linux 6.10 para PowerPC (PPC) permite a usuarios locales provocar una denegación de servicio (consumo de recursos) utilizando las funciones (1) sys_get_robust_list y (2) sys_set_robust_list para crear procesos que no pueden ser eliminados.", }, ], id: "CVE-2006-5648", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 4.6, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:S/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.1, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2006-12-14T00:28:00.000", references: [ { source: "cve@mitre.org", url: "http://secunia.com/advisories/23361", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23384", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23474", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/21582", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23474", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2006_79_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/21582", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-395-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2007-09-18 19:17
Modified
2025-04-09 00:30
Severity ?
Summary
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: false, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: false, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*", matchCriteriaId: "19D64247-F0A0-4984-84EA-B63FC901F002", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "316AA6EB-7191-479E-99D5-40DA79E340E7", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*", matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*", matchCriteriaId: "492EA1BE-E678-4300-A690-3BFCD4B233B2", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:aw:*:*:*:*:*", matchCriteriaId: "C4B5DD1C-BFF6-4247-B684-A7C3D8F60745", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*", matchCriteriaId: "4E3C9031-F69A-4B6A-A8CB-39027174AA01", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:as:*:*:*:*:*", matchCriteriaId: "327FEE54-79EC-4B5E-B838-F3C61FCDF48E", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:es:*:*:*:*:*", matchCriteriaId: "056C1C15-D110-4309-A9A6-41BD753FE4F2", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:ws:*:*:*:*:*", matchCriteriaId: "08392974-5AC1-4B12-893F-3F733EF05F80", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:as:*:*:*:*:*", matchCriteriaId: "49EF5B77-9BC9-4AE8-A677-48E5E576BE63", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:es:*:*:*:*:*", matchCriteriaId: "36389D32-61C1-4487-8399-FA7D2864FACD", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:ws:*:*:*:*:*", matchCriteriaId: "49B67F74-AF8F-4A27-AA8A-A8479E256A9F", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client:*:*:*:*:*", matchCriteriaId: "3AA8F2EC-55E9-4529-A816-B5D495605F6B", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:client_workstation:*:*:*:*:*", matchCriteriaId: "28FBE982-794E-4C22-B5EE-F48269282C32", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", matchCriteriaId: "40D71CBC-D365-4710-BAB5-8A1159F35E41", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:linux:2.1:*:aw_itanium:*:*:*:*:*", matchCriteriaId: "6B34B4FF-A596-4B1E-8DA7-40B3498147EA", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "CBBA00E3-1147-4E6F-BE93-92494285F88F", vulnerable: false, }, { criteria: "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*", matchCriteriaId: "C9092D88-585D-4A0C-B181-E8D93563C74B", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*", matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*", matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:amd64:*:*:*:*:*", matchCriteriaId: "7BD79C43-2615-47DE-A100-D21482D866F4", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:i386:*:*:*:*:*", matchCriteriaId: "1856594D-7D84-4830-A8A7-2C9D4C2D61FD", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "0B20DDF0-2FAB-4EB0-B62D-2351514B2808", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:sparc:*:*:*:*:*", matchCriteriaId: "B7748895-CE00-4BB8-BFCD-A5559BA15869", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:trolltech:qt:3.0:*:*:*:*:*:*:*", matchCriteriaId: "9CB2B261-F31A-4EDF-89D5-1648E7698559", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.0.3:*:*:*:*:*:*:*", matchCriteriaId: "E995A0F0-E1BB-441D-B145-1FB0AF4330DB", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "A0B868D0-B166-455D-A96F-8530853D83EE", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.1:*:*:*:*:*:*:*", matchCriteriaId: "F354E5EE-0B83-4960-98DF-9DBBB504C1C1", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "B546D37F-7115-4CA4-8A63-BFCC0B9E1E81", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "6BA756A7-DE14-40F4-87F6-B3374E88B21A", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.2.1:*:*:*:*:*:*:*", matchCriteriaId: "EDD3DFD7-307F-4110-A412-D1C56836DF33", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.2.3:*:*:*:*:*:*:*", matchCriteriaId: "D6D18E6C-5202-4406-AEC8-6477CDA7AE67", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.0:*:*:*:*:*:*:*", matchCriteriaId: "8A881DD8-9B96-4581-B39B-7721CBCD5F4A", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.1:*:*:*:*:*:*:*", matchCriteriaId: "C314FF87-F182-4ABF-93D4-748EEF47C5FF", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.2:*:*:*:*:*:*:*", matchCriteriaId: "63829009-5782-4671-8678-2F090CA5520A", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.3:*:*:*:*:*:*:*", matchCriteriaId: "9AA116DA-DA3F-415C-88A7-3E65EAA2089C", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.4:*:*:*:*:*:*:*", matchCriteriaId: "E9734F0E-6CB9-4C8C-B2D0-21ABA6A22D58", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.5:*:*:*:*:*:*:*", matchCriteriaId: "2B28B5A5-98EF-4710-B8B5-D348692046BC", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.6:*:*:*:*:*:*:*", matchCriteriaId: "F1539C15-BF9A-43B5-8D29-A3F2C87F92A8", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.7:*:*:*:*:*:*:*", matchCriteriaId: "A9E9281D-0DB4-491C-AD2B-E7CA77FC7E48", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:3.3.8:*:*:*:*:*:*:*", matchCriteriaId: "5DB7CA86-30F5-48B0-AB47-C4871E16DA10", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.1:*:*:*:*:*:*:*", matchCriteriaId: "00ED4154-E5B7-49F5-B97F-2B02C82D6B0E", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.1.4:*:*:*:*:*:*:*", matchCriteriaId: "5FC87D43-8E5E-4AD7-8228-345C042EC98F", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.1.5:*:*:*:*:*:*:*", matchCriteriaId: "1461D39A-7705-4932-ABA9-4A2869E692F2", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.2:*:*:*:*:*:*:*", matchCriteriaId: "1E47B11C-9098-4F39-8BF3-46C95CE63B79", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.2.1:*:*:*:*:*:*:*", matchCriteriaId: "00F001C9-E388-437A-8F72-1C1C4D54FB7F", vulnerable: true, }, { criteria: "cpe:2.3:a:trolltech:qt:4.2.3:*:*:*:*:*:*:*", matchCriteriaId: "8C558DAB-23BD-4076-B839-36B269B97650", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.", }, { lang: "es", value: "Error de superación de límite (off-by-one) en la función QUtf8Decoder::toUnicode de Trolltech Qt3 permite a usuarios locales o remotos (dependiendo del contexto) provocar una denegación de servicio (caída) mediante una cadena Unicode manipulada que dispara un desbordamiento de búfer basado en montículo. NOTA: Qt 4 tiene el mismo error en la función QUtf8Codec::convertToUnicode, pero no es explotable.", }, ], id: "CVE-2007-4137", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-09-18T19:17:00.000", references: [ { source: "secalert@redhat.com", url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc", }, { source: "secalert@redhat.com", url: "http://bugs.gentoo.org/show_bug.cgi?id=192472", }, { source: "secalert@redhat.com", url: "http://dist.trolltech.com/developer/download/175791_3.diff", }, { source: "secalert@redhat.com", url: "http://dist.trolltech.com/developer/download/175791_4.diff", }, { source: "secalert@redhat.com", url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml", }, { source: "secalert@redhat.com", url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml", }, { source: "secalert@redhat.com", url: "http://osvdb.org/39384", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26778", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26782", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/26804", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26811", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/26857", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/26868", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/26882", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/26987", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/27053", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/27275", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/27382", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/27996", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/28021", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200710-28.xml", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200712-08.xml", }, { source: "secalert@redhat.com", url: "http://securitytracker.com/id?1018688", }, { source: "secalert@redhat.com", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm", }, { source: "secalert@redhat.com", url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2007/dsa-1426", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183", }, { source: "secalert@redhat.com", url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/25657", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/usn-513-1", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/3144", }, { source: "secalert@redhat.com", url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001", }, { source: "secalert@redhat.com", url: "https://issues.rpath.com/browse/RPL-1751", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.gentoo.org/show_bug.cgi?id=192472", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://dist.trolltech.com/developer/download/175791_3.diff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://dist.trolltech.com/developer/download/175791_4.diff", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://fedoranews.org/updates/FEDORA-2007-221.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://fedoranews.org/updates/FEDORA-2007-703.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/39384", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26778", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26782", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26804", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26811", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26868", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26882", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/26987", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/27053", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/27275", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/27382", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/27996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28021", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200710-28.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200712-08.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1018688", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2007/dsa-1426", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_19_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0883.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/481498/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/25657", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-513-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/3144", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=269001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-1751", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-10-01 05:17
Modified
2025-04-09 00:30
Severity ?
Summary
The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*", matchCriteriaId: "EE2027FA-357A-4BE3-9043-6DE8307C040A", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*", matchCriteriaId: "ED638D1A-D4AB-4070-8D29-C18741D9F98F", versionEndIncluding: "1.913-1.fc7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:ntfs-3g:ntfs-3g:*:*:*:*:*:*:*:*", matchCriteriaId: "BBCA444C-CDF1-44A5-A00B-4258F8657B09", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ntfs-3g package before 1.913-2.fc7 in Fedora 7, and an ntfs-3g package in Ubuntu 7.10/Gutsy, assign incorrect permissions (setuid root) to mount.ntfs-3g, which allows local users with fuse group membership to read from and write to arbitrary block devices, possibly involving a file descriptor leak.", }, { lang: "es", value: "El paquete ntfs-3g anterior a 1.913-2.fc7 en Fedora 7, y en el paquete kntfs-3g package en Ubuntu 7.10/Gutsy, asigna de forma incorrecta los permisos (setuid root) en mount.ntfs-3g, el cual permite a usuarios locales siendo miembros de fuse leer y escribir dispositivos de bloque de su elección, posiblemente afectando a un descriptor de fichero débil.", }, ], id: "CVE-2007-5159", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: true, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-10-01T05:17:00.000", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26938", }, { source: "cve@mitre.org", url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/26938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.redhat.com/show_bug.cgi?id=298651", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-desktop-list/2007-September/msg00163.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00368.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-264", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
carnegie_mellon_university | cyrus_imap_server | 2.1.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.9 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.10 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.16 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.0_alpha | |
carnegie_mellon_university | cyrus_imap_server | 2.2.1_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.2_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.3 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.4 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.5 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.6 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.8 | |
openpkg | openpkg | current | |
conectiva | linux | 9.0 | |
conectiva | linux | 10.0 | |
redhat | fedora_core | core_2.0 | |
redhat | fedora_core | core_3.0 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*", matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*", matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*", matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*", matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) \"body[p\", (2) \"binary[p\", or (3) \"binary[p\") that cause an index increment error that leads to an out-of-bounds memory corruption.", }, { lang: "es", value: "El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) \"body[p\", (2) \"binary[p\", o (3) \"binary[p\" que producen un error de incremento de índice que conduce a una corrupción de memoria fuera de límites.", }, ], id: "CVE-2004-1013", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13274/", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-597", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-31-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13274/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2004/dsa-597", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-05-13 23:19
Modified
2025-04-09 00:30
Severity ?
Summary
MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.10 | |
ubuntu | ubuntu_linux | 7.04 | |
moinmoin | moinmoin | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*", matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*", matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:moinmoin:moinmoin:*:*:*:*:*:*:*:*", matchCriteriaId: "2D3DEE5B-FDEA-45E0-9734-E1BF90858A34", versionEndIncluding: "1.5.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "MoinMoin before 20070507 does not properly enforce ACLs for calendars and includes, which allows remote attackers to read certain pages via unspecified vectors.", }, { lang: "es", value: "MoinMoin anterior a 20070507 no impone ACLs para calendarios e inclusiones(includes), lo cual permite a atacantes remotos leer ciertas páginas a través de vectores no especificados.", }, ], id: "CVE-2007-2637", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-05-13T23:19:00.000", references: [ { source: "cve@mitre.org", url: "http://osvdb.org/36269", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/25208", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/29262", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2008/dsa-1514", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-458-1", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/36269", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/25208", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/29262", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1514", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-458-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34474", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
1996-07-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 3.0 | |
freebsd | freebsd | 2.1.0 | |
mandrakesoft | mandrake_linux | 9.2 | |
mandrakesoft | mandrake_linux | 10.0 | |
mandrakesoft | mandrake_linux | 10.1 | |
mandrakesoft | mandrake_linux | cs2.1 | |
mandrakesoft | mandrake_linux | cs3.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux_desktop | 4.0 | |
ubuntu | ubuntu_linux | 4.10 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", matchCriteriaId: "27C9E23D-AB82-4AE1-873E-C5493BB96AA1", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*", matchCriteriaId: "B5B3DB31-3998-4B75-A972-0F2675ACCA2C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*", matchCriteriaId: "37145402-6EC5-4700-8863-CE563A4F37F5", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", matchCriteriaId: "C62EF915-CA7C-4D75-BC67-E015772BB9CF", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.", }, ], evaluatorSolution: "Fixed in rev 1.3 of cpio/main.c.", id: "CVE-1999-1572", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "1996-07-16T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/14357", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/17063", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/17532", }, { source: "cve@mitre.org", url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2005/dsa-664", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-073.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-080.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-806.html", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2005/0003/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110763404701519&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/14357", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/17063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/17532", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-664", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-073.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-080.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-806.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2005/0003/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-02-23 21:28
Modified
2025-04-09 00:30
Severity ?
Summary
The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | * | |
ubuntu | ubuntu_linux | * | |
ubuntu | ubuntu_linux | * | |
enigmail | enigmail | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*", matchCriteriaId: "7C80A2AF-B598-46D0-B54A-DC6C804518B2", versionEndIncluding: "5.10", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*", matchCriteriaId: "C78F7413-DD84-4198-B893-5D9C068ADA5D", versionEndIncluding: "6.06_lts", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:*:*:powerpc:*:*:*:*:*", matchCriteriaId: "60D1D7AB-363F-413D-A5F5-0E7C41446042", versionEndIncluding: "6.10", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*", matchCriteriaId: "4944FD3F-3DAA-4DCD-8F3B-ECDF55AFA726", versionEndIncluding: "0.92.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The enigmail extension before 0.94.2 does not properly handle large, encrypted file e-mail attachments, which allows remote attackers to cause a denial of service (crash), as demonstrated with Mozilla Thunderbird.", }, { lang: "es", value: "La extensión enigmail anterior 0.94.2 no maneja adecuadamente los ficheros adjuntos encriptados al e-mail, lo cual permite a atacantes remotos provocar denegación de servicio (caida), como se demostró con Mozilla Thunderbird.", }, ], id: "CVE-2006-5877", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-02-23T21:28:00.000", references: [ { source: "cve@mitre.org", url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", }, { source: "cve@mitre.org", url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/22684", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-427-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.mozdev.org/show_bug.cgi?id=9730", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://enigmail.mozdev.org/changelog.html#enig0.94.2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/22684", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-427-1", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-04-27 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ascii:ptex:3.1.4:*:*:*:*:*:*:*", matchCriteriaId: "4AE020D3-0F38-4F53-AFB7-B4E98EAC659F", vulnerable: true, }, { criteria: "cpe:2.3:a:cstex:cstetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "E16058D9-AC8B-4A7C-865F-93B476348363", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*", matchCriteriaId: "4E26BB15-4CF8-4496-A7F7-EB34C444EF72", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*", matchCriteriaId: "7C4B7C23-0C54-4FBA-A774-9CC1E148376E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*", matchCriteriaId: "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*", matchCriteriaId: "A786A770-919E-4E23-949D-D836F316618A", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*", matchCriteriaId: "00A2249C-73DE-434E-A41F-4EDB0ADC0845", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*", matchCriteriaId: "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*", matchCriteriaId: "FB7653F1-70E2-423F-A6A9-30333644B506", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.110:*:*:*:*:*:*:*", matchCriteriaId: "1CB6AE42-D493-43E5-A97C-76C8450E5881", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.112:*:*:*:*:*:*:*", matchCriteriaId: "2E70576E-C253-4F8B-A93E-14CC2EE7114D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnome:gpdf:0.131:*:*:*:*:*:*:*", matchCriteriaId: "832C5512-B473-40E8-BF4F-EC6ABFE46749", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3:*:*:*:*:*:*:*", matchCriteriaId: "053435DD-BFDF-4C39-9919-11C42D569085", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "E9BB1A3C-3348-4545-A513-E504B33F72AB", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "CD45E2C8-0B0E-484F-8050-94BF77798183", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "4EAA654E-9DD4-4614-92D7-EF4D676B3A18", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta1:*:*:*:*:*:*:*", matchCriteriaId: "89C96FC9-40DB-467D-A701-49F97A1B887D", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta2:*:*:*:*:*:*:*", matchCriteriaId: "76128BDC-2CA7-4AE7-8C4F-BCB3835CA938", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:koffice:1.3_beta3:*:*:*:*:*:*:*", matchCriteriaId: "0B2517C7-27EF-4961-91C3-CA33219AFF2E", vulnerable: true, }, { criteria: "cpe:2.3:a:kde:kpdf:3.2:*:*:*:*:*:*:*", matchCriteriaId: "EDAF6452-F3B0-4F62-893E-BCFA6AB7AE3B", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32a:*:*:*:*:*:*:*", matchCriteriaId: "EE346726-71D6-438B-B600-A7E107332816", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.32b:*:*:*:*:*:*:*", matchCriteriaId: "87E85020-B4DB-4011-BDD0-1C8967D45A84", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33:*:*:*:*:*:*:*", matchCriteriaId: "8189A9AB-F685-40E2-944F-8BD3DD6FA0A2", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.33a:*:*:*:*:*:*:*", matchCriteriaId: "C33B8585-FA5F-4210-A997-615BCEE1726F", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.34:*:*:*:*:*:*:*", matchCriteriaId: "F4AE4C34-C497-426F-AC0D-1805A50582EF", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.35:*:*:*:*:*:*:*", matchCriteriaId: "A2989EFF-07B9-4EF2-B6C1-59E4F52FDC92", vulnerable: true, }, { criteria: "cpe:2.3:a:pdftohtml:pdftohtml:0.36:*:*:*:*:*:*:*", matchCriteriaId: "A3970101-5E83-49FD-BCB6-D9176D46B5A4", vulnerable: true, }, { criteria: "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", matchCriteriaId: "29DC217F-C257-4A3C-9CBD-08010C30BEC3", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.6:*:*:*:*:*:*:*", matchCriteriaId: "739A56F5-B19A-4B92-B9CB-04ECE4FFE204", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "C86C7D6F-C39E-4403-86C6-F87599570E97", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0:*:*:*:*:*:*:*", matchCriteriaId: "236005A1-C175-44D3-8D0C-C48F943F3D66", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "0AF2AD80-5E65-4B57-933B-C395E98EF10D", vulnerable: true, }, { criteria: "cpe:2.3:a:tetex:tetex:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "07C92A0E-1DDA-4F83-A904-24A35C38883A", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.92:*:*:*:*:*:*:*", matchCriteriaId: "0304E1E3-8766-40D0-8879-A652B4E9E72D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.93:*:*:*:*:*:*:*", matchCriteriaId: "188F1343-8082-4B54-8DA4-E344818ABD52", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.3:*:*:*:*:*:*:*", matchCriteriaId: "1169B802-7279-437F-AF59-621A67DC92EC", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*", matchCriteriaId: "7B93B3ED-AF82-49A9-8C7F-E5F652F19669", vulnerable: true, }, { criteria: "cpe:2.3:o:sgi:advanced_linux_environment:3.0:*:*:*:*:*:*:*", matchCriteriaId: "A05AC3EE-6292-4ECC-9680-048A12FCE723", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*", matchCriteriaId: "58792F77-B06F-4780-BA25-FE1EE6C3FDD9", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2:*:*:*:*:*:*:*", matchCriteriaId: "82F69843-978D-4686-BC5B-1D09DA4A21BD", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.1:*:*:*:*:*:*:*", matchCriteriaId: "ACEE0AED-7918-41E9-A902-AC4070E03132", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.2:*:*:*:*:*:*:*", matchCriteriaId: "81E19472-47B4-4398-A188-CA5A5D3E7060", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*", matchCriteriaId: "D17407A2-089E-43A5-9BD5-EFF966F5CC16", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3:*:*:*:*:*:*:*", matchCriteriaId: "9C4B436D-8D6A-473E-B707-26147208808B", vulnerable: true, }, { criteria: "cpe:2.3:o:kde:kde:3.3.1:*:*:*:*:*:*:*", matchCriteriaId: "1E26B353-4985-4116-B97A-5767CDC732F1", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:*:*:*:*:*:*", matchCriteriaId: "02EE2D72-B1E6-4380-80B0-E40A23DDD115", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "111575DE-98A2-4C54-BDE1-CACC74D22B35", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "1976D15D-9EE6-4A49-B59F-34F0505FD5BC", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*", matchCriteriaId: "962FC8D7-BE5D-4E7D-9ADC-511681C593BF", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*", matchCriteriaId: "451453AC-65FF-4E3B-9AC1-2DDB2E2182E4", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*", matchCriteriaId: "7716120D-5110-42B0-A574-9AA2AC8D3C32", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*", matchCriteriaId: "CB4C8426-CAF2-4366-94C0-1BA1C544FB6F", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*", matchCriteriaId: "5CC7D746-B98B-4FAF-B816-57222759A344", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*", matchCriteriaId: "830D48B8-D21D-4D31-99A1-20C231804DBE", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", matchCriteriaId: "5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", matchCriteriaId: "D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", matchCriteriaId: "BCC94EF9-5872-402F-B2FC-06331A924BB2", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", matchCriteriaId: "F163E145-09F7-4BE2-9B46-5B6713070BAB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", matchCriteriaId: "124E1802-7984-45ED-8A92-393FC20662FD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*", matchCriteriaId: "C7F08806-9458-439A-8EAE-2553122262ED", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*", matchCriteriaId: "1B67020A-6942-4478-B501-764147C4970D", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*", matchCriteriaId: "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*", matchCriteriaId: "E74E0A28-7C78-4160-8BCF-99605285C0EE", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*", matchCriteriaId: "76159C25-0760-47CB-AFCE-28306CDEA830", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*", matchCriteriaId: "7786607A-362E-4817-A17E-C76D6A1F737D", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*", matchCriteriaId: "8A206E1C-C2EC-4356-8777-B18D7069A4C3", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*", matchCriteriaId: "6E2FE291-1142-4627-A497-C0BB0D934A0B", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*", matchCriteriaId: "49BC7C7E-046C-4186-822E-9F3A2AD3577B", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*", matchCriteriaId: "2FE69F6F-6B17-4C87-ACA4-A2A1FB47206A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*", matchCriteriaId: "467A30EB-CB8F-4928-AC8F-F659084A9E2B", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*", matchCriteriaId: "714C1439-AB8E-4A8B-A783-D60E9DDC38D4", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*", matchCriteriaId: "62CAE5B0-4D46-4A93-A343-C8E9CB574C62", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*", matchCriteriaId: "819868A7-EB1E-4CA9-8D71-72F194E5EFEB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:spa:*:*:*:*:*", matchCriteriaId: "FB647A8B-ADB9-402B-96E1-45321C75731B", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*", matchCriteriaId: "0944FD27-736E-4B55-8D96-9F2CA9BB9B05", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*", matchCriteriaId: "373BB5AC-1F38-4D0A-97DC-08E9654403EE", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*", matchCriteriaId: "B5E71DA3-F4A0-46AF-92A2-E691C7A65528", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*", matchCriteriaId: "0519FF7D-363E-4530-9E63-6EA3E88432DC", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*", matchCriteriaId: "1975A2DD-EB22-4ED3-8719-F78AA7F414B2", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*", matchCriteriaId: "FAE3FF4F-646F-4E05-A08A-C9399DEF60F1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "19F606EE-530F-4C06-82DB-52035EE03FA3", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*", matchCriteriaId: "A0E896D5-0005-4E7E-895D-B202AFCE09A1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*", matchCriteriaId: "5A8B313F-93C7-4558-9571-DE1111487E17", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", matchCriteriaId: "37F124FE-15F1-49D7-9E03-8E036CE1A20C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "D5F98B9A-880E-45F0-8C16-12B22970F0D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*", matchCriteriaId: "B905C6E9-5058-4FD7-95B6-CD6AB6B2F516", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities.", }, { lang: "es", value: "El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales.", }, ], id: "CVE-2005-0206", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-04-27T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-034.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-053.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-057.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-132.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-213.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11501", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:041", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:042", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:043", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:052", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:056", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-034.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-053.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-057.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-132.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-213.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11501", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17818", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11107", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-27 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
rob_flynn | gaim | 0.10 | |
rob_flynn | gaim | 0.10.3 | |
rob_flynn | gaim | 0.50 | |
rob_flynn | gaim | 0.51 | |
rob_flynn | gaim | 0.52 | |
rob_flynn | gaim | 0.53 | |
rob_flynn | gaim | 0.54 | |
rob_flynn | gaim | 0.55 | |
rob_flynn | gaim | 0.56 | |
rob_flynn | gaim | 0.57 | |
rob_flynn | gaim | 0.58 | |
rob_flynn | gaim | 0.59 | |
rob_flynn | gaim | 0.59.1 | |
rob_flynn | gaim | 0.60 | |
rob_flynn | gaim | 0.61 | |
rob_flynn | gaim | 0.62 | |
rob_flynn | gaim | 0.63 | |
rob_flynn | gaim | 0.64 | |
rob_flynn | gaim | 0.65 | |
rob_flynn | gaim | 0.66 | |
rob_flynn | gaim | 0.67 | |
rob_flynn | gaim | 0.68 | |
rob_flynn | gaim | 0.69 | |
rob_flynn | gaim | 0.70 | |
rob_flynn | gaim | 0.71 | |
rob_flynn | gaim | 0.72 | |
rob_flynn | gaim | 0.73 | |
rob_flynn | gaim | 0.74 | |
rob_flynn | gaim | 0.75 | |
rob_flynn | gaim | 0.78 | |
rob_flynn | gaim | 0.82 | |
rob_flynn | gaim | 0.82.1 | |
rob_flynn | gaim | 1.0 | |
rob_flynn | gaim | 1.0.1 | |
gentoo | linux | * | |
gentoo | linux | 1.4 | |
slackware | slackware_linux | 9.0 | |
slackware | slackware_linux | 9.1 | |
slackware | slackware_linux | 10.0 | |
slackware | slackware_linux | current | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:rob_flynn:gaim:0.10:*:*:*:*:*:*:*", matchCriteriaId: "6D1EE775-471F-4D9F-9635-41CB581168D7", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.10.3:*:*:*:*:*:*:*", matchCriteriaId: "5E56639E-2F96-4110-8846-0EA887D2967B", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.50:*:*:*:*:*:*:*", matchCriteriaId: "A2FDCAE1-0B5D-449F-A83A-5028E7701109", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.51:*:*:*:*:*:*:*", matchCriteriaId: "F984C4C7-6431-48DD-A0E0-0DC5F6052EB8", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.52:*:*:*:*:*:*:*", matchCriteriaId: "E955A141-DAEB-40EA-BE35-A5EED928E030", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.53:*:*:*:*:*:*:*", matchCriteriaId: "E3F02AE7-7A9C-4219-9472-9FAC8CBC637B", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.54:*:*:*:*:*:*:*", matchCriteriaId: "E94CDB8A-7120-41C6-95AF-5DBAD74F3204", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.55:*:*:*:*:*:*:*", matchCriteriaId: "F4A3A068-BEBB-4E31-9CAD-4A2008CFBC91", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.56:*:*:*:*:*:*:*", matchCriteriaId: "DA529226-9252-41EE-8543-692F3119CF6D", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.57:*:*:*:*:*:*:*", matchCriteriaId: "C6FDD0E8-D0CB-4B4C-8E4C-A4979B116CC0", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.58:*:*:*:*:*:*:*", matchCriteriaId: "7366C749-E27C-422C-BFE0-DCC4B4D9C8AB", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.59:*:*:*:*:*:*:*", matchCriteriaId: "5622F4C0-43C8-44B1-A7C7-D3A7F1199FA1", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.59.1:*:*:*:*:*:*:*", matchCriteriaId: "2A2E8C61-B01A-482A-9B8D-0072AB6BB7DF", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.60:*:*:*:*:*:*:*", matchCriteriaId: "30E40E9A-950B-4D6E-A748-5F76F7B97AEB", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.61:*:*:*:*:*:*:*", matchCriteriaId: "C4FF2E49-7561-461A-98BD-4778C6764020", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.62:*:*:*:*:*:*:*", matchCriteriaId: "4168D220-61A9-4E9F-A5A8-4832822E35EF", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.63:*:*:*:*:*:*:*", matchCriteriaId: "253631B3-8A0C-48DC-851A-F5A6AB490BCB", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.64:*:*:*:*:*:*:*", matchCriteriaId: "1266BD64-E19D-4686-9E00-42CC9AF94756", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.65:*:*:*:*:*:*:*", matchCriteriaId: "C62BCA03-A187-432B-B2B3-40DE99A9986C", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.66:*:*:*:*:*:*:*", matchCriteriaId: "92762951-6F9E-426D-8157-55C65A561417", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.67:*:*:*:*:*:*:*", matchCriteriaId: "00AFDEF5-5E42-4BF6-8EC6-FE7FCD4DD4AC", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.68:*:*:*:*:*:*:*", matchCriteriaId: "7A4B3DA2-9ECB-454D-8775-9571B158007F", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.69:*:*:*:*:*:*:*", matchCriteriaId: "A041E262-E36F-44C3-B83B-2E79653B74EE", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.70:*:*:*:*:*:*:*", matchCriteriaId: "333D0BA1-7676-417D-BB92-AAA1AAED2D0A", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.71:*:*:*:*:*:*:*", matchCriteriaId: "BF449EC2-A6F2-405F-BEE7-0516E092E6F3", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.72:*:*:*:*:*:*:*", matchCriteriaId: "840C5668-D951-4A62-B555-EB3D91A08B61", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.73:*:*:*:*:*:*:*", matchCriteriaId: "BC715625-C4E7-49AC-9F3E-7306114878D4", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.74:*:*:*:*:*:*:*", matchCriteriaId: "C8834643-F682-4FC1-93DE-BE4754E993AD", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.75:*:*:*:*:*:*:*", matchCriteriaId: "42DC59A0-4BD8-42AC-B2E0-BFC32FCE7396", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.78:*:*:*:*:*:*:*", matchCriteriaId: "5414E26C-C4BD-4E88-A9F4-05312F303BC8", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.82:*:*:*:*:*:*:*", matchCriteriaId: "E4A65A06-A2D9-4ACD-A19A-5CC0D6636139", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:0.82.1:*:*:*:*:*:*:*", matchCriteriaId: "B3EF25C4-A89D-4FBC-8EBE-89B502369A7A", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:1.0:*:*:*:*:*:*:*", matchCriteriaId: "43BC7CF5-118A-4127-BA07-749179FA5A92", vulnerable: true, }, { criteria: "cpe:2.3:a:rob_flynn:gaim:1.0.1:*:*:*:*:*:*:*", matchCriteriaId: "EE70BCCA-A025-4F93-A773-8D4FF482540A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", matchCriteriaId: "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "300A6A65-05FD-401C-80F6-B5F5B1F056E0", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "AA3D53C9-3806-45E6-8AE9-7D41280EF64C", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "D29C5A03-A7C9-4780-BB63-CF1E874D018D", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*", matchCriteriaId: "B1CB2DD9-E77F-46EE-A145-F87AD10EA8E4", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an \"unexpected sequence of MSNSLP messages\" that results in an unbounded copy operation that writes to the wrong buffer.", }, ], id: "CVE-2004-0891", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-27T05:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://gaim.sourceforge.net/security/?id=9", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-604.html", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-8-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://gaim.sourceforge.net/security/?id=9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-23.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2004-604.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2188", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17786", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17787", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11790", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-8-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | gettext | 0.14.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:gettext:0.14.1:*:*:*:*:*:*:*", matchCriteriaId: "2117E41A-5CB2-47C9-A390-E87C35D59BE4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The (1) autopoint and (2) gettextize scripts in the GNU gettext package 1.14 and later versions, as used in Trustix Secure Linux 1.5 through 2.1 and other operating systems, allows local users to overwrite files via a symlink attack on temporary files.", }, ], id: "CVE-2004-0966", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-02-09T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml", }, { source: "cve@mitre.org", url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11282", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2004/0050", }, { source: "cve@mitre.org", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-5-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136323", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110382652226638&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200410-10.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11282", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2004/0050", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:051", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-5-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.0 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.1 | |
linux | linux_kernel | 2.6.2 | |
linux | linux_kernel | 2.6.3 | |
linux | linux_kernel | 2.6.4 | |
linux | linux_kernel | 2.6.5 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.6 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.7 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.8 | |
linux | linux_kernel | 2.6.9 | |
linux | linux_kernel | 2.6.10 | |
linux | linux_kernel | 2.6_test9_cvs | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.", }, { lang: "es", value: "Condición de carrera en SELinux 2.6.x a 2.6.9 permite a usuarios locales causar una denegación de servicio (caída del kernel) mediante SOCK_SEQPACKET unix domain sockets, que no son manejados adecuadamente en la función sock_dgram_sendmsg.", }, ], id: "CVE-2004-1069", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 1.2, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:H/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=linux-kernel&m=110045613004761", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110306397320336&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=linux-kernel&m=110045613004761", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18312", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2006-12-07 11:28
Modified
2025-04-09 00:30
Severity ?
Summary
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | privacy_guard | 1.2.4 | |
gnu | privacy_guard | 1.2.5 | |
gnu | privacy_guard | 1.2.6 | |
gnu | privacy_guard | 1.2.7 | |
gnu | privacy_guard | 1.3.3 | |
gnu | privacy_guard | 1.3.4 | |
gnu | privacy_guard | 1.4 | |
gnu | privacy_guard | 1.4.1 | |
gnu | privacy_guard | 1.4.2 | |
gnu | privacy_guard | 1.4.2.1 | |
gnu | privacy_guard | 1.4.2.2 | |
gnu | privacy_guard | 1.4.3 | |
gnu | privacy_guard | 1.4.4 | |
gnu | privacy_guard | 1.4.5 | |
gnu | privacy_guard | 1.9.10 | |
gnu | privacy_guard | 1.9.15 | |
gnu | privacy_guard | 1.9.20 | |
gnu | privacy_guard | 2.0 | |
gnu | privacy_guard | 2.0.1 | |
gpg4win | gpg4win | 1.0.7 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux | 4.0 | |
redhat | enterprise_linux_desktop | 3.0 | |
redhat | enterprise_linux_desktop | 4.0 | |
redhat | fedora_core | core_5.0 | |
redhat | fedora_core | core6 | |
redhat | linux_advanced_workstation | 2.1 | |
rpath | linux | 1 | |
slackware | slackware_linux | 11.0 | |
ubuntu | ubuntu_linux | 5.10 | |
ubuntu | ubuntu_linux | 6.06 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.4:*:*:*:*:*:*:*", matchCriteriaId: "76CAFD24-E53F-488C-BD9F-BE31D30828AD", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.5:*:*:*:*:*:*:*", matchCriteriaId: "A5D3628A-3BDD-4C6F-AE7D-C81FC3EE1630", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.6:*:*:*:*:*:*:*", matchCriteriaId: "74589745-A9A6-44DB-B4F0-B61B663ECA21", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.2.7:*:*:*:*:*:*:*", matchCriteriaId: "BB2B99CB-5950-42E7-ACD5-38457CBE9095", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "D81AF47A-56BA-4D90-A4D4-D7A37333A117", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.3.4:*:*:*:*:*:*:*", matchCriteriaId: "E55DBB73-EF6C-4C46-9E5A-7C35D7FD190C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4:*:*:*:*:*:*:*", matchCriteriaId: "205C014A-236B-44CF-A92D-B4D6392FF9A7", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.1:*:*:*:*:*:*:*", matchCriteriaId: "F412ECF0-DA84-47B8-98FD-06019C9E63E0", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2:*:*:*:*:*:*:*", matchCriteriaId: "CE04D970-A467-4648-B99C-895BA8BEE79B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2.1:*:*:*:*:*:*:*", matchCriteriaId: "C79DC753-35CB-46FA-BDE4-650BD1730505", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.2.2:*:*:*:*:*:*:*", matchCriteriaId: "F54DA969-ABAA-4021-9EC3-C30A45D1A7ED", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.3:*:*:*:*:*:*:*", matchCriteriaId: "E1B68B13-DC1F-46AB-B360-D04E48A0939F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.4:*:*:*:*:*:*:*", matchCriteriaId: "AE65D839-7798-4DE4-AA89-765E91FC6A42", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.4.5:*:*:*:*:*:*:*", matchCriteriaId: "B256D201-D3E1-472F-8B4F-8D6D5D763003", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.10:*:*:*:*:*:*:*", matchCriteriaId: "5C1151E8-E9D3-4244-9765-B06D07848AFF", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.15:*:*:*:*:*:*:*", matchCriteriaId: "345FBFB9-7FA3-4F7D-B605-A38054744F4B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:1.9.20:*:*:*:*:*:*:*", matchCriteriaId: "859126BF-7327-4C54-AE2E-4A961911C937", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:2.0:*:*:*:*:*:*:*", matchCriteriaId: "7461ED0D-1DC2-4019-BEC0-2E9AF2724371", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:privacy_guard:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "3C3FA38E-5BF1-4CDA-AB4F-19150FD3EE10", vulnerable: true, }, { criteria: "cpe:2.3:a:gpg4win:gpg4win:1.0.7:*:*:*:*:*:*:*", matchCriteriaId: "047F3D25-1795-494A-93AC-9AF80AC72680", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_5.0:*:*:*:*:*:*:*", matchCriteriaId: "DA3B94B6-A5E4-4432-802E-BFAD7F3B5B4C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core6:*:*:*:*:*:*:*", matchCriteriaId: "E007512B-2A01-4915-82D1-EDDEE8ED3190", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:rpath:linux:1:*:*:*:*:*:*:*", matchCriteriaId: "A2B66383-4124-4579-BC8E-36DBE7ABB543", vulnerable: true, }, { criteria: "cpe:2.3:o:slackware:slackware_linux:11.0:*:*:*:*:*:*:*", matchCriteriaId: "74022B69-6557-4746-9080-24E4DDA44026", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:*:*:*:*:*:*", matchCriteriaId: "ADE3B4BE-7B43-47C7-823A-C019DF12498F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06:*:*:*:*:*:*:*", matchCriteriaId: "AD9460AD-229A-4DC2-BFBA-818640A464AD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A \"stack overwrite\" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.", }, { lang: "es", value: "Una vulnerabilidad de \"escritura en pila\" en GnuPG (gpg) 1.x anterior a la 1.4.6, 2.x anterior a la 2.0.2 y 1.9.0 hasta la 1.9.95 permite a atacantes ejecutar código de su elección mediante paquetes OpenPGP artesanales que provocan que GnuPG haga referencia a un puntero a función que está en memoria (en la pila) que ya ha sido liberada.", }, ], id: "CVE-2006-6235", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2006-12-07T11:28:00.000", references: [ { source: "cve@mitre.org", url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc", }, { source: "cve@mitre.org", url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html", }, { source: "cve@mitre.org", url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23245", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23250", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23255", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23259", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23269", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23284", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23290", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23299", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23303", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23329", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23335", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/23513", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/24047", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200612-03.xml", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1017349", }, { source: "cve@mitre.org", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1231", }, { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/427009", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html", }, { source: "cve@mitre.org", url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/21462", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2006/0070", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-393-1", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-393-2", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2006/4881", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711", }, { source: "cve@mitre.org", url: "https://issues.rpath.com/browse/RPL-835", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23245", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23250", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23255", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23259", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/23269", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23284", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23290", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23299", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23303", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23329", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23335", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/23513", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24047", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200612-03.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1017349", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-047.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1231", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/427009", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2006:228", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2006_28_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2006-0754.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/453664/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/453723/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/21462", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2006/0070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.ubuntu.com/usn/usn-393-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-393-2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/4881", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/30711", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-835", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2007-04-06 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*", matchCriteriaId: "86FD134D-A5C5-4B08-962D-70CF07C74923", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*", matchCriteriaId: "FA84692E-F99D-4207-B4F2-799A6ADB88AD", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "8B0F1091-4B76-44F5-B896-6D37E2F909A2", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:sparc:*:*:*:*:*", matchCriteriaId: "EF15862D-6108-4791-8817-622123C8D10C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:amd64:*:*:*:*:*", matchCriteriaId: "F1672825-AB87-4402-A628-B33AE5B7D4C8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:i386:*:*:*:*:*", matchCriteriaId: "939216D8-9E6C-419E-BC0A-EC7F0F29CE95", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:powerpc:*:*:*:*:*", matchCriteriaId: "E520564E-964D-4758-945B-5EF0C35E605C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:sparc:*:*:*:*:*", matchCriteriaId: "2294D5A7-7B36-497A-B0F1-514BC49E1423", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:amd64:*:*:*:*:*", matchCriteriaId: "AB80939E-8B58-48B6-AFB7-9CF518C0EE1F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:i386:*:*:*:*:*", matchCriteriaId: "80FF1759-5F86-4046-ABA3-EB7B0038F656", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*", matchCriteriaId: "DF578B64-57E2-4FCD-A6E1-F8F3317FDB88", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:sparc:*:*:*:*:*", matchCriteriaId: "61B11116-FA94-4989-89A1-C7B551D5195A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:x.org:libxfont:1.2.2:*:*:*:*:*:*:*", matchCriteriaId: "AFADBA5A-8168-40B8-B5CA-0F1F7F9193D2", vulnerable: true, }, { criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0:*:*:*:*:*:*:*", matchCriteriaId: "837EBF15-6C7D-46B8-8A90-9DFBF2C09FF3", vulnerable: true, }, { criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0.1:*:*:*:*:*:*:*", matchCriteriaId: "E859A205-0DC2-4E28-8FF0-72D66DE9B280", vulnerable: true, }, { criteria: "cpe:2.3:a:xfree86_project:x11r6:4.3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "F18E8C7B-53AC-4BC7-9E00-A70293172B58", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:rpath:rpath_linux:1:*:*:*:*:*:*:*", matchCriteriaId: "0DD12BC0-1E50-49C6-AD0D-8CE90F0E8449", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop:*:*:*:*:*", matchCriteriaId: "FE524195-06F1-4504-9223-07596588CC70", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:desktop_workstation:*:*:*:*:*", matchCriteriaId: "2FEED00F-3B70-4E57-AD80-7903AECED14B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:server:*:*:*:*:*", matchCriteriaId: "40D71CBC-D365-4710-BAB5-8A1159F35E41", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", matchCriteriaId: "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*", matchCriteriaId: "F5BB6C5D-4C43-4BB8-B1CE-A70BBE650CA1", vulnerable: true, }, { criteria: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "CC77812C-D84E-493E-9D21-1BA6C2129E70", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*", matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:x86_64:*:*:*:*:*", matchCriteriaId: "19AD5F8D-6EB9-4E4B-9E82-FFBAB68797E9", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*", matchCriteriaId: "94F65351-C2DA-41C0-A3F9-1AE951E4386E", vulnerable: false, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "1B795F9F-AFB3-4A2A-ABC6-9246906800DE", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*", matchCriteriaId: "77FF1412-A7DA-4669-8AE1-5A529AB387FB", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.", }, { lang: "es", value: "Desbordamiento de enteros en la función bdfReadCharacters en (1) X.Org libXfont before 20070403 y (2) freetype 2.3.2 y permite a usuarios remotos validados ejecutar código de su elección a través de fuentes manipuladas BDF, las cueles dan como resultado un desbordamiento de pila.", }, ], id: "CVE-2007-1351", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 8.5, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2007-04-06T01:19:00.000", references: [ { source: "secalert@redhat.com", url: "http://issues.foresightlinux.org/browse/FL-223", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", }, { source: "secalert@redhat.com", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { source: "secalert@redhat.com", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { source: "secalert@redhat.com", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { source: "secalert@redhat.com", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24741", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24745", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24756", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24758", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24765", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24768", }, { source: "secalert@redhat.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24770", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24771", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24772", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24776", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24791", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24885", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24889", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24921", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/24996", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25004", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25006", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25096", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25195", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25216", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25305", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/25495", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/28333", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/30161", }, { source: "secalert@redhat.com", url: "http://secunia.com/advisories/33937", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200705-02.xml", }, { source: "secalert@redhat.com", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { source: "secalert@redhat.com", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", }, { source: "secalert@redhat.com", url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", }, { source: "secalert@redhat.com", url: "http://sourceforge.net/project/shownotes.php?release_id=498954", }, { source: "secalert@redhat.com", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { source: "secalert@redhat.com", url: "http://support.apple.com/kb/HT3438", }, { source: "secalert@redhat.com", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { source: "secalert@redhat.com", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2007/dsa-1294", }, { source: "secalert@redhat.com", url: "http://www.debian.org/security/2008/dsa-1454", }, { source: "secalert@redhat.com", url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { source: "secalert@redhat.com", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", }, { source: "secalert@redhat.com", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { source: "secalert@redhat.com", url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html", }, { source: "secalert@redhat.com", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { source: "secalert@redhat.com", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { source: "secalert@redhat.com", url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { source: "secalert@redhat.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/23283", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/23300", }, { source: "secalert@redhat.com", url: "http://www.securityfocus.com/bid/23402", }, { source: "secalert@redhat.com", url: "http://www.securitytracker.com/id?1017857", }, { source: "secalert@redhat.com", url: "http://www.trustix.org/errata/2007/0013/", }, { source: "secalert@redhat.com", url: "http://www.ubuntu.com/usn/usn-448-1", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/1217", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/1264", }, { source: "secalert@redhat.com", url: "http://www.vupen.com/english/advisories/2007/1548", }, { source: "secalert@redhat.com", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", }, { source: "secalert@redhat.com", url: "https://issues.rpath.com/browse/RPL-1213", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", }, { source: "secalert@redhat.com", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://issues.foresightlinux.org/browse/FL-223", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=501", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2007-0125.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24741", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24745", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24756", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24758", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24765", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24768", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/24770", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24771", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24772", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24776", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24791", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24885", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24889", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24921", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/24996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25004", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25006", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25096", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25195", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25216", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25305", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/25495", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28333", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/30161", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/33937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200705-02.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200705-10.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.626733", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=498954", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sourceforge.net/project/shownotes.php?release_id=498954", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102886-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.apple.com/kb/HT3438", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-178.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.avaya.com/elmodocs2/security/ASA-2007-193.htm", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2007/dsa-1294", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2008/dsa-1454", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:080", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:081", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_27_x.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2007_6_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openbsd.org/errata39.html#021_xorg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.openbsd.org/errata40.html#011_xorg", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0126.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0132.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2007-0150.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/464686/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/464816/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/23283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23300", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/23402", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id?1017857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2007/0013/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-448-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1264", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2007/1548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/33417", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-1213", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11266", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1810", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-189", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
carnegie_mellon_university | cyrus_imap_server | 2.1.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.9 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.10 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.16 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.0_alpha | |
carnegie_mellon_university | cyrus_imap_server | 2.2.1_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.2_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.3 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.4 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.5 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.6 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.8 | |
openpkg | openpkg | current | |
conectiva | linux | 9.0 | |
conectiva | linux | 10.0 | |
redhat | fedora_core | core_2.0 | |
redhat | fedora_core | core_3.0 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*", matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*", matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*", matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*", matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.", }, { lang: "es", value: "Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015.", }, ], id: "CVE-2004-1011", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13274/", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13274/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18198", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", matchCriteriaId: "0D50385A-1D5D-4517-B5FA-1BB60BA4C484", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", matchCriteriaId: "752BDD31-53A2-4246-8E95-77694548DB2B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "079F39E2-69BF-47AC-87CF-A47D37EA27F8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", matchCriteriaId: "E3F7EB61-55A5-4776-B0E7-3508920A6CEA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", matchCriteriaId: "A442DE97-4485-4D95-B95D-58947585E455", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", matchCriteriaId: "AE31DFF8-06AB-489D-A0C5-509C090283B5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", matchCriteriaId: "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", matchCriteriaId: "1E8A6564-129A-4555-A5ED-6F65C56AE7B4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", matchCriteriaId: "237174A4-E030-4A0B-AD0B-5C463603EAA4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", matchCriteriaId: "DF49BF03-C25E-4737-84D5-892895C86C58", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", matchCriteriaId: "5D7F8F11-1869-40E2-8478-28B4E946D3CC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", matchCriteriaId: "D2019E0E-426B-43AF-8904-1B811AE171E8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", matchCriteriaId: "9062BAB5-D437-49BE-A384-39F62434B70B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", matchCriteriaId: "3BA1504C-14FE-4C21-A801-944041F2946F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", matchCriteriaId: "21B69535-4FB6-4FAD-AAA6-C790FF82EFAF", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", matchCriteriaId: "6E53C673-9D6D-42C8-A502-033E1FC28D97", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", matchCriteriaId: "55C5FC1A-1253-4390-A4FC-573BB14EA937", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", matchCriteriaId: "6F4AC452-6042-409D-8673-ACAD108EE3B5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", matchCriteriaId: "2FE1009B-371A-48E2-A456-935A1F0B7D0D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", matchCriteriaId: "C844A170-B5A7-4703-AF3B-67366D44EA8B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", matchCriteriaId: "44308D13-D935-4FF8-AB52-F0E115ED1AD2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", matchCriteriaId: "3D41CB12-7894-4D25-80EC-23C56171D973", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", matchCriteriaId: "9BCD9C12-EDAB-473F-9CC5-04F06B413720", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", matchCriteriaId: "58EBC5C8-5CA8-4881-A036-179FDEBA3CA4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", matchCriteriaId: "09789843-6A1A-4CDB-97E8-89E82B79DDB5", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", matchCriteriaId: "9C001822-FDF8-497C-AC2C-B59A00E9ACD2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", matchCriteriaId: "118211EF-CED7-4EB5-9669-F54C8169D4AE", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", matchCriteriaId: "58288F0F-B4CE-445C-AD93-DA73E3AD6FC3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", matchCriteriaId: "CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", matchCriteriaId: "9A405AE2-ECC4-4BB0-80DD-4736394FB217", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", matchCriteriaId: "4AB4AD26-6AF2-4F3A-B602-F231FAABA73E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", matchCriteriaId: "B86C77AB-B8FF-4376-9B4E-C88417396F3D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", matchCriteriaId: "E5612FB0-8403-4A7E-B89A-D7BDFAC00078", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", matchCriteriaId: "FA699BB4-94AA-40E6-A6B6-33E3D416CDA7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", matchCriteriaId: "AFDA151E-E614-4A24-A34D-B6D5309110CC", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", matchCriteriaId: "A7818E11-1BEB-4DAA-BA7A-A278454BA4B3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", matchCriteriaId: "441BE3A0-20F4-4972-B279-19B3DB5FA14D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", matchCriteriaId: "09BFA20B-2F31-4246-8F74-63DF1DB884EE", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", matchCriteriaId: "5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", matchCriteriaId: "2D33C6EF-DBE1-4943-83E4-1F10670DAC6E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", matchCriteriaId: "00EAEA17-033A-4A50-8E39-D61154876D2F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", matchCriteriaId: "4AE93D3D-34B4-47B7-A784-61F4479FF5A2", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", matchCriteriaId: "E6288144-0CD7-45B6-B5A7-09B1DF14FBE8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", matchCriteriaId: "9FFD9D1C-A459-47AD-BC62-15631417A32F", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", matchCriteriaId: "4ECDEC87-0132-46B6-BD9B-A94F9B669EAA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", matchCriteriaId: "6E21E50A-A368-4487-A791-87366CC5C86E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", matchCriteriaId: "43E84296-9B5C-4623-A2C4-431D76FC2765", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", matchCriteriaId: "E18328E2-3CB5-4D36-8EA3-77DD909B46A3", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", matchCriteriaId: "EF73D76B-FBB8-4D10-8393-9FAF53392A4B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", matchCriteriaId: "F177AE1C-58C2-4575-807C-ABFFC5119FA8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", matchCriteriaId: "61EBA52A-2D8B-4FB5-866E-AE67CE1842E7", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", matchCriteriaId: "3B13D898-C1B6-44B9-8432-7DDB8A380E9E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", matchCriteriaId: "51A612F6-E4EB-4E34-8F55-79E16C74758E", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", matchCriteriaId: "5C19B266-8FE7-49ED-8678-2D522257491D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", matchCriteriaId: "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", matchCriteriaId: "15C4D826-A419-45F5-B91C-1445DB480916", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", matchCriteriaId: "0D9F2B04-A1F2-4788-A53D-C8274A758DDA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", matchCriteriaId: "FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", matchCriteriaId: "9A5309ED-D84F-4F52-9864-5B0FEEEE5022", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", matchCriteriaId: "DD7C441E-444B-4DF5-8491-86805C70FB99", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", matchCriteriaId: "C9CCE8F3-84EE-4571-8AAA-BF2D132E9BD4", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", matchCriteriaId: "8E4BC012-ADE4-468F-9A25-261CD8055694", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", matchCriteriaId: "D8A80E6A-6502-4A33-83BA-7DCC606D79AA", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", matchCriteriaId: "0D6428EB-5E1A-41CB-979C-4C9402251D8B", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", matchCriteriaId: "2DCA9879-C9F5-475A-8EC9-04D151001C8D", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", matchCriteriaId: "0A94132F-4C47-49CC-B03C-8756613E9A38", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", matchCriteriaId: "46A60ED5-1D92-4B40-956F-D1801CAB9039", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", matchCriteriaId: "3F629879-66F0-427B-86D8-D740E0E3F6E8", vulnerable: true, }, { criteria: "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", matchCriteriaId: "C89129C5-A1DB-4018-B43A-C60C8E650080", vulnerable: true, }, { criteria: "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", matchCriteriaId: "647BA336-5538-4972-9271-383A0EC9378E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", matchCriteriaId: "2641EE56-6F9D-400B-B456-877F4DA79B10", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", matchCriteriaId: "A4A9461E-C117-42EC-9F14-DF2A82BA7C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E0B458EA-495E-40FA-9379-C03757F7B1EE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", matchCriteriaId: "409E324A-C040-494F-A026-9DCAE01C07F8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", matchCriteriaId: "1728AB5D-55A9-46B0-A412-6F7263CAEB5A", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", matchCriteriaId: "6474B775-C893-491F-A074-802AFB1FEDD8", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", matchCriteriaId: "84A50ED3-FD0D-4038-B3E7-CC65D166C968", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", matchCriteriaId: "777F9EC0-2919-45CA-BFF8-78A02537C513", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*", matchCriteriaId: "1267DA81-5D2A-4F5C-BF87-F46813E21E19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*", matchCriteriaId: "74CD3CFE-7780-4BDC-B318-9B2D7B3B2DC4", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", matchCriteriaId: "31C3FFDD-03BF-4FD4-B7A7-B62AFD5DBA19", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", matchCriteriaId: "065FF0F1-7FAC-4584-92EA-EAA87DC76FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "839D2945-1417-43F5-A526-A14C491CBCEE", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", matchCriteriaId: "E06DCF0D-3241-453A-A0E4-937FE25EC404", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", matchCriteriaId: "B484D091-62DE-4EF2-AC54-26896CA8B315", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2", vulnerable: true, }, { criteria: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", matchCriteriaId: "9428589A-0BD2-469E-978D-38239117D972", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", matchCriteriaId: "3BD12488-1ED8-4751-ABF5-3578D54750A8", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", matchCriteriaId: "AE3733CF-4C88-443C-9B90-6477C9C500D0", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", matchCriteriaId: "9C500A75-D75E-45B4-B582-0F0DF27C3C04", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip after the decompression is complete.", }, ], id: "CVE-2005-0988", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 3.7, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-05-02T04:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2005-357.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/18100", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/21253", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/22033", }, { source: "cve@mitre.org", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", }, { source: "cve@mitre.org", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2005/dsa-752", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/15487", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.securityfocus.com/archive/1/394965", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/12996", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/19289", }, { source: "cve@mitre.org", tags: [ "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2006/3101", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2005-357.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/18100", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/21253", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/22033", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-752", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/15487", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.securityfocus.com/archive/1/394965", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/12996", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/19289", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "US Government Resource", ], url: "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2006/3101", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.", lastModified: "2007-03-14T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2008-01-17 23:00
Modified
2025-04-09 00:30
Severity ?
Summary
The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 6.06_lts | |
ubuntu | ubuntu_linux | 6.10 | |
ubuntu | ubuntu_linux | 7.04 | |
ubuntu | ubuntu_linux | 7.10 | |
boost | boost | 1.33 | |
boost | boost | 1.34 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.06_lts:*:*:*:*:*:*:*", matchCriteriaId: "B8517E55-4357-4AFD-B571-5533123CB014", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:*:*:*:*:*:*", matchCriteriaId: "33904E65-D50D-4EAE-885D-FE2EBF535F18", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.04:*:*:*:*:*:*:*", matchCriteriaId: "F9A940B9-A553-4A0B-8ECF-52FD26894285", vulnerable: false, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:7.10:*:*:*:*:*:*:*", matchCriteriaId: "06FD8602-7069-41C6-B65C-84928EDCE2D6", vulnerable: false, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:boost:boost:1.33:*:*:*:*:*:*:*", matchCriteriaId: "B7A527FE-ED5E-4C9A-823C-0D76B1885691", vulnerable: true, }, { criteria: "cpe:2.3:a:boost:boost:1.34:*:*:*:*:*:*:*", matchCriteriaId: "C9CAD8FD-3F47-4AA4-9B97-41892E58FB57", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The get_repeat_type function in basic_regex_creator.hpp in the Boost regex library (aka Boost.Regex) in Boost 1.33 and 1.34 allows context-dependent attackers to cause a denial of service (NULL dereference and crash) via an invalid regular expression.", }, { lang: "es", value: "La función get_repeat_type en basic_regex_creator.hpp de la librería de expresiones regulares (también conocido como Boost.Regex) de Boost 1.33 y 1.34 permite a atacantes remotos dependientes de contexto provocar una denegación de servicio (referencia nula y caída) mediante una expresión regular inválida.", }, ], id: "CVE-2008-0172", lastModified: "2025-04-09T00:30:58.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2008-01-17T23:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugs.gentoo.org/show_bug.cgi?id=205955", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28511", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28527", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28545", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28705", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28860", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/28943", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/29323", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/48099", }, { source: "cve@mitre.org", url: "http://svn.boost.org/trac/boost/changeset/42674", }, { source: "cve@mitre.org", url: "http://svn.boost.org/trac/boost/changeset/42745", }, { source: "cve@mitre.org", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/27325", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/usn-570-1", }, { source: "cve@mitre.org", url: "http://www.vupen.com/english/advisories/2008/0249", }, { source: "cve@mitre.org", url: "https://issues.rpath.com/browse/RPL-2143", }, { source: "cve@mitre.org", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.gentoo.org/show_bug.cgi?id=205955", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28511", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28527", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28545", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28705", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28860", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/28943", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/29323", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/48099", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://svn.boost.org/trac/boost/changeset/42674", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://svn.boost.org/trac/boost/changeset/42745", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://wiki.rpath.com/Advisories:rPSA-2008-0063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200802-08.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:032", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/488102/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/27325", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-570-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vupen.com/english/advisories/2008/0249", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://issues.rpath.com/browse/RPL-2143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00760.html", }, ], sourceIdentifier: "cve@mitre.org", vendorComments: [ { comment: "This issue did not affect the version of boost as shipped with Red Hat Enterprise Linux 4.\n\nFor Red Hat Enterprise Linux 5, Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-0172\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.", lastModified: "2008-05-12T00:00:00", organization: "Red Hat", }, ], vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*", matchCriteriaId: "37042CDE-E4FE-442E-891A-CD84433D36E2", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*", matchCriteriaId: "11F6E348-01DF-4FA4-808E-39A2A7A2B97B", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*", matchCriteriaId: "578BA199-EF04-4595-AFDE-54FD66B7FC39", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*", matchCriteriaId: "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*", matchCriteriaId: "B82E464F-3871-40C7-A758-B81582D193AE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*", matchCriteriaId: "05B7E2C5-6139-47F9-A310-F2BC0EF83942", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", matchCriteriaId: "C883DB55-0CAC-462A-912B-69E9E7E1C79C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", matchCriteriaId: "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", matchCriteriaId: "787CB28C-74C6-4356-8AB3-4183CD941EE6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", matchCriteriaId: "C30459B9-0FAC-48DF-9601-AAD1A028846F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", matchCriteriaId: "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", matchCriteriaId: "209E0C63-FC71-4E19-B3D5-BCB71A758252", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", matchCriteriaId: "48DBBAC9-AA05-409F-82B2-A552A3417E45", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", matchCriteriaId: "268CDE97-C837-482A-BB16-77662C45074C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", matchCriteriaId: "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", matchCriteriaId: "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", matchCriteriaId: "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", matchCriteriaId: "18E35942-7E70-468E-BA15-97CA5086C1B3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", matchCriteriaId: "CCB886BB-EA7C-4618-9029-BB16A45A4301", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", matchCriteriaId: "56EC4832-82D1-4E57-86DA-8918CA006723", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", matchCriteriaId: "92A42D3C-2539-469A-81BD-8306CD7E1A12", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", matchCriteriaId: "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", matchCriteriaId: "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", matchCriteriaId: "362893B4-9BC1-4584-ACD5-08878A19E3C7", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", matchCriteriaId: "FD940715-318E-44C1-8613-FEBFB8F1741A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", matchCriteriaId: "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", matchCriteriaId: "17187451-7715-464D-9C7B-3F949345CF2B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", matchCriteriaId: "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", matchCriteriaId: "CE3658E1-B451-4B8B-A21A-3D66359D21DD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", matchCriteriaId: "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", matchCriteriaId: "041AD718-39A7-4B13-90C5-680743B1C982", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", matchCriteriaId: "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", matchCriteriaId: "067774E4-0704-4F5D-9B46-4DE19FE51163", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", matchCriteriaId: "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", matchCriteriaId: "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", matchCriteriaId: "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", matchCriteriaId: "536F109A-7932-4424-889E-02922D8B783D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", matchCriteriaId: "036AE068-C061-49B1-95D1-98A09A79EE25", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", matchCriteriaId: "E7A83184-F554-42C0-8162-B484CBAD09D0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", matchCriteriaId: "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", matchCriteriaId: "A9244622-781A-46AE-866D-0EDDE5323048", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", matchCriteriaId: "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", matchCriteriaId: "FA85DD18-19D9-4BF8-8420-DEA24AE44046", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", matchCriteriaId: "670C3F10-A811-43D0-B762-5791D41C8B78", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", matchCriteriaId: "7F379312-B95D-4C9B-918F-6A57B12EB5A2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", matchCriteriaId: "C36F606D-59B6-4FA0-8785-3B14592FE9CC", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", matchCriteriaId: "2681F9FF-5899-4EFA-85A3-CEAB4402C786", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", matchCriteriaId: "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", matchCriteriaId: "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", matchCriteriaId: "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", matchCriteriaId: "50FC2146-5BC0-4CA6-8700-5877C01B777D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", matchCriteriaId: "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", matchCriteriaId: "6A3C056E-EEB9-4B95-A155-F71B80B9695D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", matchCriteriaId: "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", matchCriteriaId: "2EFB2D10-E255-4DD3-BF03-217803CDED24", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", matchCriteriaId: "436D90B0-C839-4B9F-853D-51C34459A11F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", matchCriteriaId: "F3535453-E7DC-4561-BB35-32DFF78E451C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", matchCriteriaId: "37512B4B-C428-4D30-AAF3-9557C7257967", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", matchCriteriaId: "75B1527A-5039-470B-87DC-B02F557364A2", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "22408224-0634-4CC6-888F-892E9D932CE3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2B2646B4-593E-4AC9-8292-1AD805632DC0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", matchCriteriaId: "4D57E557-7F6D-4618-86AC-B10C08341900", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", matchCriteriaId: "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", matchCriteriaId: "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "5EC21395-4C78-4343-9452-578B24C2656D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", matchCriteriaId: "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "B3340604-0D38-4494-847B-E9E8B0026A28", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "EC117BF1-3127-477A-9500-C9A32596ED8E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", matchCriteriaId: "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "78B46FFA-5B09-473E-AD33-3DB18BD0DAFE", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", matchCriteriaId: "0EFE2E73-9536-41A9-B83B-0A06B54857F4", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", matchCriteriaId: "39605B96-BAD6-45C9-BB9A-43D6E2C51ADD", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a \"_\" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.", }, ], id: "CVE-2004-0957", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: true, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-02-09T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947", }, { source: "cve@mitre.org", url: "http://www.ciac.org/ciac/bulletins/p-018.shtml", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2005/dsa-707", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-597.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-611.html", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-32-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ciac.org/ciac/bulletins/p-018.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2005/dsa-707", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-597.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-611.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17783", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-32-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-04-14 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*", matchCriteriaId: "D073442B-D7E7-4E07-AF2D-E22FE65B09A9", vulnerable: true, }, { criteria: "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*", matchCriteriaId: "E942E0E7-0808-479C-B061-66119EBA12E3", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", matchCriteriaId: "E586558A-ABC3-42EB-8B4D-DC92A0D695E6", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "68B1272B-8B71-4D2D-A5E4-0E7828500C22", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "A7C7B9C0-91A2-4529-B879-60DE043E719C", vulnerable: true, }, { criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*", matchCriteriaId: "E25F5CF2-F891-41CA-A40C-13966F72FDF8", vulnerable: true, }, { criteria: "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*", matchCriteriaId: "7417958C-5321-41D6-9D1A-D16BF5511E81", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", matchCriteriaId: "0AFD594E-48BA-4281-8DEE-306E3008ABB9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", matchCriteriaId: "2CDE1E92-C64D-4A3B-95A2-384BD772B28B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", matchCriteriaId: "4B130EB7-A951-4717-A906-E2F602F7B69F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "4177C378-7729-46AB-B49B-C6DAED3200E7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", matchCriteriaId: "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", matchCriteriaId: "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", matchCriteriaId: "3528DABD-B821-4D23-AE12-614A9CA92C46", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "9E661D58-18DF-4CCF-9892-F873618F4535", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", matchCriteriaId: "E0F0D201-B1DC-4024-AF77-A284673618F3", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", matchCriteriaId: "052E3862-BFB7-42E7-889D-8590AFA8EF37", vulnerable: true, }, { criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2BB0B27C-04EA-426F-9016-7406BACD91DF", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", matchCriteriaId: "81B543F9-C209-46C2-B0AE-E14818A6992E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "EC79FF22-2664-4C40-B0B3-6D23B5F45162", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", matchCriteriaId: "DB89C970-DE94-4E09-A90A-077DB83AD156", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", matchCriteriaId: "F9440B25-D206-4914-9557-B5F030890DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "E9933557-3BCA-4D92-AD4F-27758A0D3347", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", matchCriteriaId: "10A60552-15A5-4E95-B3CE-99A4B26260C1", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF3BBBC3-3EF9-4E24-9DE2-627E172A5473", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", matchCriteriaId: "7D74A418-50F0-42C0-ABBC-BBBE718FF025", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*", matchCriteriaId: "3C84296C-2C8A-4DCD-9751-52951F8BEA9F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", matchCriteriaId: "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", matchCriteriaId: "C7EAAD04-D7C4-43DE-B488-1AAD014B503E", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "D2E2EF3C-1379-4CBE-8FF5-DACD47834651", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", matchCriteriaId: "F7446746-87B7-4BD3-AABF-1E0FAA8265AB", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", matchCriteriaId: "C1A3B951-A1F8-4291-82FA-AB7922D13ACE", vulnerable: true, }, { criteria: "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", matchCriteriaId: "E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "20C0BD87-CE4B-49D2-89BE-EF282C43AD72", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C3E6C4A8-59F4-43EE-8413-E95289037598", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "FE76357A-27E6-4D85-9AA0-1BB658C41568", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "C56C5FDB-24E2-479D-87CA-164CD28567D3", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB", vulnerable: true, }, { criteria: "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "D982AE39-BB57-49E7-B5FE-5EF1ADE2F019", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", }, { lang: "es", value: "Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA.", }, ], id: "CVE-2004-1235", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:H/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 1.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-04-14T04:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "cve@mitre.org", url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20162", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20163", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20202", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20338", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-043.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/advisories/7804", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/advisories/7805", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/advisories/7806", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12190", }, { source: "cve@mitre.org", url: "http://www.trustix.org/errata/2005/0001/", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://isec.pl/vulnerabilities/isec-0021-uselib.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110512575901427&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.redhat.com/support/errata/RHSA-2005-043.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-092.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/advisories/7804", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/advisories/7805", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/advisories/7806", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/12190", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.org/errata/2005/0001/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18800", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9567", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
suse | suse_linux | 8.0 | |
suse | suse_linux | 8.1 | |
suse | suse_linux | 8.2 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.0 | |
suse | suse_linux | 9.1 | |
suse | suse_linux | 9.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", matchCriteriaId: "41BEAD26-ADDC-4FC6-A493-584315183936", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "153E8DFB-4197-4117-87C6-C0FBE3C05600", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "765BF98E-7AB1-45EA-9935-2C311E621211", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", matchCriteriaId: "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", matchCriteriaId: "22408224-0634-4CC6-888F-892E9D932CE3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", matchCriteriaId: "2B2646B4-593E-4AC9-8292-1AD805632DC0", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", matchCriteriaId: "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", matchCriteriaId: "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", matchCriteriaId: "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", matchCriteriaId: "4D57E557-7F6D-4618-86AC-B10C08341900", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", matchCriteriaId: "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", matchCriteriaId: "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", matchCriteriaId: "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", matchCriteriaId: "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", matchCriteriaId: "5EC21395-4C78-4343-9452-578B24C2656D", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", matchCriteriaId: "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", matchCriteriaId: "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", matchCriteriaId: "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", matchCriteriaId: "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", matchCriteriaId: "B3340604-0D38-4494-847B-E9E8B0026A28", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", matchCriteriaId: "EC117BF1-3127-477A-9500-C9A32596ED8E", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", matchCriteriaId: "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", vulnerable: true, }, { criteria: "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", matchCriteriaId: "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "28CD54FE-D682-4063-B7C3-8B29B26B39AD", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", matchCriteriaId: "F8C55338-3372-413F-82E3-E1B476D6F41A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", matchCriteriaId: "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", matchCriteriaId: "56EF103F-5668-4754-A83B-D3662D0CE815", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", matchCriteriaId: "CFABFCE5-4F86-4AE8-9849-BC360AC72098", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", matchCriteriaId: "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.", }, { lang: "es", value: "MySQL anteriores a 4.0.20 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante una consulta MATCH AGAINST con comillas dobles iniciales pero sin comillas dobles de cierre.", }, ], id: "CVE-2004-0956", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://bugs.mysql.com/bug.php?id=3870", }, { source: "cve@mitre.org", url: "http://lists.mysql.com/packagers/202", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html", }, { source: "cve@mitre.org", url: "http://www.trustix.net/errata/2004/0054/", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://bugs.mysql.com/bug.php?id=3870", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.mysql.com/packagers/202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_01_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.trustix.net/errata/2004/0054/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17768", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", matchCriteriaId: "2E244C37-E366-482E-9173-9376D0839839", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", matchCriteriaId: "11F96BB9-6509-4F1E-9590-E55EE8C6F992", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", matchCriteriaId: "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", matchCriteriaId: "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", matchCriteriaId: "718D4631-440E-4783-8966-B2A2D3EF89B3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", matchCriteriaId: "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", matchCriteriaId: "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", matchCriteriaId: "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", matchCriteriaId: "7015F57A-1E3B-42D2-9D12-F695078EFB21", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", matchCriteriaId: "467721EE-5130-46C5-BBB7-0F4878F3F171", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", matchCriteriaId: "171257E7-12C5-4283-88F7-FFE643995563", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", matchCriteriaId: "0887E02F-9F36-41F0-9F75-060B8414D7BF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "5F49A384-7222-41F3-9BE1-4E18C00E50A6", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "05520FE3-C48D-42E8-BC24-C2396BD46CBA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", matchCriteriaId: "D865FBB6-E07D-492F-A75E-168B06C8ADEE", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "598F24C2-0366-4799-865C-5EE4572B734B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "D0399660-6385-45AB-9785-E504D8788146", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", matchCriteriaId: "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "B91F6CBE-400F-4D0B-B893-34577B47A342", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "1548ECFD-FCB5-4AE0-9788-42F61F25489F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", matchCriteriaId: "6ABB9787-5497-4BDC-8952-F99CF60A89BD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "615F6BA2-CD51-4159-B28A-A018CA9FC25C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", matchCriteriaId: "093848CB-68A1-4258-8357-373A477FE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", matchCriteriaId: "E275F440-A427-465F-B314-BF0730C781DB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", matchCriteriaId: "98651D39-60CF-409F-8276-DBBB56B972AA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "067B8E09-C923-4DDA-92DB-4A2892CB526A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "9EBE3738-E530-4EC6-9FC6-1A063605BE05", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", matchCriteriaId: "D77F8919-4064-4EA5-A948-76178EA21F83", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", matchCriteriaId: "5E7C423D-23DE-4C7B-A518-66F87E041925", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", matchCriteriaId: "8EA1382E-71B0-4E65-A310-716A244F4FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", matchCriteriaId: "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", matchCriteriaId: "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", matchCriteriaId: "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", matchCriteriaId: "824BBD31-8F3B-4F05-981B-ABF662BBF5F2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", matchCriteriaId: "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", matchCriteriaId: "388A5C99-1F60-4C20-9AE5-6E73E5A3F819", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", matchCriteriaId: "F677E992-8D37-438F-97DF-9D98B28F020C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", matchCriteriaId: "5888F8D7-15C2-4435-BB3C-8674DFAF0089", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", matchCriteriaId: "29439AD0-EB8D-4675-A77A-6548FF27ADA3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", matchCriteriaId: "F27AADF6-1605-47FC-8C4D-87827A578A90", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", matchCriteriaId: "B42F4080-A76F-4D17-85E2-CD2D2E4D0450", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", matchCriteriaId: "6968EF1D-7CC5-430D-866D-206F66486F63", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", matchCriteriaId: "50E6F5C5-BF74-4C10-830A-F232D528D290", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "476687F9-722B-490C-BD0B-B5F2CD7891DC", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", matchCriteriaId: "A399D94B-D08D-4454-A07A-6634C9AE612F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", matchCriteriaId: "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", matchCriteriaId: "DCD8E4AE-FEF7-4CE2-B338-4F766921593F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", matchCriteriaId: "13A8B50A-73F6-4FCF-A81F-FB624FBA7143", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", matchCriteriaId: "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", matchCriteriaId: "8D27D843-2DA7-4481-857C-09FDC4FBD45C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", matchCriteriaId: "BCB93128-2743-4668-8C48-9B7282D4A672", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", matchCriteriaId: "040991B8-FB4B-480B-B53B-AA7A884F9F19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", matchCriteriaId: "BFA592BC-5846-4FC1-B2A7-13E622705DA8", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", matchCriteriaId: "59688C40-C92F-431E-ADD7-6782622862D3", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", matchCriteriaId: "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", matchCriteriaId: "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", matchCriteriaId: "C5FE15BF-91C7-452A-BE1B-7EC9632421C2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", matchCriteriaId: "15C1923C-D9C4-400D-9F0F-20B519EEC9C0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", matchCriteriaId: "E51913F9-FC7D-450A-9A82-5084AA74A5B2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", matchCriteriaId: "B62E02D5-9EEE-439B-A510-BEEE28A9F358", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", matchCriteriaId: "02278C07-E649-427D-9E5C-F1738A01BCBD", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", matchCriteriaId: "E120257D-346B-4BA6-A431-E6F820FBB5FB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", matchCriteriaId: "142BCD48-8387-4D0C-A052-44DD4144CBFF", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", matchCriteriaId: "7BCA84E2-AC4A-430D-8A30-E660D2A232A0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", matchCriteriaId: "2255842B-34CD-4062-886C-37161A065703", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", matchCriteriaId: "F0ED322D-004C-472E-A37F-89B78C55FE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", matchCriteriaId: "412F7334-C46B-4F61-B38A-2CA56B498151", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", matchCriteriaId: "5967AF83-798D-4B1E-882A-5737FFC859C9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", matchCriteriaId: "A90D2123-D55B-4104-8D82-5B6365AA3B77", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", matchCriteriaId: "DCCDFD49-D402-420E-92F5-20445A0FE139", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", matchCriteriaId: "2A073700-E8A9-4F76-9265-2BE0D5AC9909", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", matchCriteriaId: "8877D178-1655-46E9-8F5A-2DD576601F38", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", matchCriteriaId: "0D55059C-B867-4E0F-B29C-9CD2C86915A5", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", matchCriteriaId: "8358E965-3689-4B05-8470-C4A1463FA0E9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", matchCriteriaId: "E8220D81-9065-471F-9256-CFE7B9941555", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", matchCriteriaId: "D2A55C17-C530-4898-BC95-DE4D495F0D7C", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", matchCriteriaId: "2C14A949-E2B8-4100-8ED4-645CB996B08A", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", matchCriteriaId: "EB445E3E-CCBD-4737-BE30-841B9A79D558", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", matchCriteriaId: "F5301E27-8021-467C-A9A2-AF2137EF0299", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", matchCriteriaId: "79787868-2D77-4B55-AD61-C2B357CCE047", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", matchCriteriaId: "2B3F27D3-8F1D-4576-A584-1E2059CC67B1", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "FB5D260C-AE1C-47E9-A88C-B9C2B4349249", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", matchCriteriaId: "A0934C49-5F88-4189-BD88-2F32C39C2F25", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "AA9958C6-AB7D-4B67-9AA7-42B628CBC391", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", matchCriteriaId: "14B0A230-4054-4483-A3A7-9A5A286C7552", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", matchCriteriaId: "F90242EF-048B-4539-AA41-87AA84875A9E", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", matchCriteriaId: "3C4E9325-2A70-4E15-9AAF-5588BF218055", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", matchCriteriaId: "01402A85-B681-4DE0-B7BB-F52567DA29E2", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", matchCriteriaId: "1FC53528-A67F-42DF-B8DA-778A65893F9D", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", matchCriteriaId: "608FDE1E-B02A-45A2-8877-0E52A5BD0963", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", }, { lang: "es", value: "La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la función sendmsg, lo que produce una condición de bloqueo mutuo.", }, ], id: "CVE-2004-1016", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20162", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20163", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20202", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/20338", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-689.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11921", }, { source: "cve@mitre.org", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-38-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://isec.pl/vulnerabilities/isec-0019-scm.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20163", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20202", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/20338", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1069", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1070", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2006/dsa-1082", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2004_44_kernel.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-689.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-016.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2005-017.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11921", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://bugzilla.fedora.us/show_bug.cgi?id=2336", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18483", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11816", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-38-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2010-08-10 12:23
Modified
2025-04-11 00:51
Severity ?
Summary
The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ubuntu | ubuntu_linux | 9.10 | |
ubuntu | ubuntu_linux | 10.04 | |
dell | latitude_2110_netbook | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:9.10:*:*:*:*:*:*:*", matchCriteriaId: "27C9BF8A-AD42-401F-A8CA-486B6DCD47BB", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:10.04:-:lts:*:*:*:*:*", matchCriteriaId: "3976D70F-3D30-4EFF-9777-C687B293606B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_2110_netbook:*:*:*:*:*:*:*:*", matchCriteriaId: "30DE3567-65F0-431D-B12A-B2764BA313FB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The base-files package before 5.0.0ubuntu7.1 on Ubuntu 9.10 and before 5.0.0ubuntu20.10.04.2 on Ubuntu 10.04 LTS, as shipped on Dell Latitude 2110 netbooks, does not require authentication for package installation, which allows remote archive servers and man-in-the-middle attackers to execute arbitrary code via a crafted package.", }, { lang: "es", value: "El paquete base-files anterior a v5.0.0ubuntu7.1 en Ubuntu v9.10 y anterior a v5.0.0ubuntu20.10.04.2 en Ubuntu v10.04 LTS, como los incluidos en portátiles Dell Latitude 2110, no necesitan autenticación para la instalación de paquetes, lo que permite a atacantes con servidores de archivos remotos y \"man-in-the-middle\" (intermediario) ejecutar código de su elección a través de paquetes manipulados.", }, ], id: "CVE-2010-0834", lastModified: "2025-04-11T00:51:21.963", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 9.3, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], }, published: "2010-08-10T12:23:05.850", references: [ { source: "security@ubuntu.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/40889", }, { source: "security@ubuntu.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/42280", }, { source: "security@ubuntu.com", url: "http://www.ubuntu.com/usn/usn-968-1", }, { source: "security@ubuntu.com", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2010/2015", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/40889", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/42280", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/usn-968-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2010/2015", }, ], sourceIdentifier: "security@ubuntu.com", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
carnegie_mellon_university | cyrus_imap_server | 2.1.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.9 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.10 | |
carnegie_mellon_university | cyrus_imap_server | 2.1.16 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.0_alpha | |
carnegie_mellon_university | cyrus_imap_server | 2.2.1_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.2_beta | |
carnegie_mellon_university | cyrus_imap_server | 2.2.3 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.4 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.5 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.6 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.7 | |
carnegie_mellon_university | cyrus_imap_server | 2.2.8 | |
openpkg | openpkg | current | |
conectiva | linux | 9.0 | |
conectiva | linux | 10.0 | |
redhat | fedora_core | core_2.0 | |
redhat | fedora_core | core_3.0 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
trustix | secure_linux | 2.2 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*", matchCriteriaId: "7077ABB3-CD11-4E1C-9E34-8EC94C1101F4", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*", matchCriteriaId: "EC21C9C1-C8A2-4879-A604-E1192438A847", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*", matchCriteriaId: "FDF89521-977F-425A-BC5B-9D6F2F778125", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", matchCriteriaId: "22FC7757-3A91-4E49-92C4-603A403BF7F8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*", matchCriteriaId: "6D17A195-4E9E-49C8-878D-D64CB6DB175F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*", matchCriteriaId: "56A72779-D978-40E4-B2E6-BA7DB94B1FAF", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*", matchCriteriaId: "A5D1923E-96B6-46F6-8E30-3831CA047C7F", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "FC2BDC99-FA96-4520-9485-F091F0DD4F8D", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "AE7DA2ED-7300-4736-BE05-8B6DE2CD71C8", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*", matchCriteriaId: "9EA0C525-DC15-4C9E-BD7E-967BEF3AED9B", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "DD50BC1E-6793-44EE-B563-B1095BD710C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7:*:*:*:*:*:*:*", matchCriteriaId: "3CA911A6-2192-42F0-9E60-171B221241C7", vulnerable: true, }, { criteria: "cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "AC4475B5-443F-4ECD-B095-4D84F9D5F96D", vulnerable: true, }, { criteria: "cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*", matchCriteriaId: "D342447B-5233-45FD-B1CF-8D84921402AD", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "F4007B0D-9606-46BD-866A-7911BEA292BE", vulnerable: true, }, { criteria: "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*", matchCriteriaId: "A35FC777-A34E-4C7B-9E93-8F17F3AD5180", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", matchCriteriaId: "EC80CF67-C51D-442C-9526-CFEDE84A6304", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "5AB70F82-52BB-4D0D-9A24-9AF67278466D", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command (\"body[p\") that is treated as a different command (\"body.peek\") and causes an index increment error that leads to an out-of-bounds memory corruption.", }, { lang: "es", value: "El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden (\"body[p\") que es tratada como una orden distinta (\"body.peek\") y produce un error de incremento de índice que conduce a una corrupción de memoria fuera de límites.", }, ], id: "CVE-2004-1012", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-01-10T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "cve@mitre.org", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13274/", }, { source: "cve@mitre.org", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "cve@mitre.org", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-597", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-31-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://asg.web.cmu.edu/cyrus/download/imapd/changes.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=110123023521619&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13274/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.e-matters.de/advisories/152004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://security.gentoo.org/glsa/glsa-200411-34.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-597", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDKSA-2004:139", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/18199", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-31-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2005-03-01 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
xmlsoft | libxml | 1.8.17 | |
xmlsoft | libxml2 | 2.5.11 | |
xmlsoft | libxml2 | 2.6.6 | |
xmlsoft | libxml2 | 2.6.7 | |
xmlsoft | libxml2 | 2.6.8 | |
xmlsoft | libxml2 | 2.6.9 | |
xmlsoft | libxml2 | 2.6.11 | |
xmlsoft | libxml2 | 2.6.12 | |
xmlsoft | libxml2 | 2.6.13 | |
xmlsoft | libxml2 | 2.6.14 | |
xmlstarlet | command_line_xml_toolkit | 0.9.1 | |
redhat | fedora_core | core_2.0 | |
trustix | secure_linux | 2.0 | |
trustix | secure_linux | 2.1 | |
ubuntu | ubuntu_linux | 4.1 | |
ubuntu | ubuntu_linux | 4.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:xmlsoft:libxml:1.8.17:*:*:*:*:*:*:*", matchCriteriaId: "E7C0B552-67E9-48E5-ABFB-AF0CD6DA46FE", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.5.11:*:*:*:*:*:*:*", matchCriteriaId: "43F8E361-E6D3-4666-B18D-928D550FD5D2", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.6:*:*:*:*:*:*:*", matchCriteriaId: "EB8BEC58-AB2A-4953-A2E8-338EB894A494", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.7:*:*:*:*:*:*:*", matchCriteriaId: "ABDE6C9A-4F24-42B4-8AA3-3EBC97190322", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.8:*:*:*:*:*:*:*", matchCriteriaId: "44FB2813-BE9F-46A8-864B-435D883CA0FA", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.9:*:*:*:*:*:*:*", matchCriteriaId: "F9DF1336-F831-4507-B45E-574BDE8AA8BA", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.11:*:*:*:*:*:*:*", matchCriteriaId: "33268B2F-3591-48D9-B123-92E3ABF157F1", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.12:*:*:*:*:*:*:*", matchCriteriaId: "0830367A-9FB3-4291-88C0-38A471DFD22B", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.13:*:*:*:*:*:*:*", matchCriteriaId: "73E4EB1B-2E8B-4504-AB05-F4D4E6B038E9", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlsoft:libxml2:2.6.14:*:*:*:*:*:*:*", matchCriteriaId: "B5815E25-5305-4A32-81B3-89DB1D5C1AC0", vulnerable: true, }, { criteria: "cpe:2.3:a:xmlstarlet:command_line_xml_toolkit:0.9.1:*:*:*:*:*:*:*", matchCriteriaId: "5CF12410-9F1E-452C-BAA6-22E73A9FA75C", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", matchCriteriaId: "E6996B14-925B-46B8-982F-3545328B506B", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", matchCriteriaId: "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA", vulnerable: true, }, { criteria: "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", matchCriteriaId: "A67735E5-E43E-4164-BDB2-ADC6E0288E9F", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", matchCriteriaId: "6E94583A-5184-462E-9FC4-57B35DA06DA7", vulnerable: true, }, { criteria: "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", matchCriteriaId: "E905FAAD-37B6-4DD0-A752-2974F8336273", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.", }, ], id: "CVE-2004-0989", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-03-01T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/13000", }, { source: "cve@mitre.org", url: "http://securitytracker.com/id?1011941", }, { source: "cve@mitre.org", url: "http://www.ciac.org/ciac/bulletins/p-029.shtml", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2004/dsa-582", }, { source: "cve@mitre.org", url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/11179", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/11180", }, { source: "cve@mitre.org", url: "http://www.osvdb.org/11324", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-615.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2004-650.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11526", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505", }, { source: "cve@mitre.org", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173", }, { source: "cve@mitre.org", url: "https://www.ubuntu.com/usn/usn-89-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000890", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2005/Jan/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=109880813013482&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/13000", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1011941", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ciac.org/ciac/bulletins/p-029.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2004/dsa-582", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.gentoo.org/security/en/glsa/glsa-200411-05.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2005_01_sr.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/11179", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/11180", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.osvdb.org/11324", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-615.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2004-650.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/11526", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17870", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17872", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17875", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/17876", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1173", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.ubuntu.com/usn/usn-89-1/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }