Twenty Year Anniversary
Showing 1 - 25 of 145 RSS Feed

Files

RHSA-2004-373.txt
Posted Aug 6, 2004
Site rhn.redhat.com

Red Hat Security Advisory RHSA-2004:373 - Flaws have been found in several of the GNOME VFS extfs backend scripts. Red Hat Enterprise Linux ships with vulnerable scripts, but they are not used by default. An attacker who is able to influence a user to open a specially-crafted URI using gnome-vfs could perform actions as that user.

systems | linux, redhat
advisories | CVE-2004-0494
MD5 | e668a24a1467a5ebea95c5b7a9daaabe
RHSA-2003:039-06.im
Posted Mar 10, 2003
Site redhat.com

Red Hat Security Advisory RHSA-2003:039-06 - The Internet Message (IM) Package that comes with Red Hat Linux has a vulnerability in the way two IM utilities create temporary files. Anticipating the names used to create files and directories stored in /tmp, it may be possible for a local attacker to corrupt or modify data as another user. Vulnerable versions include 7.0, 7.1, 7.2, 7.3, and 8.0.

tags | local
systems | linux, redhat
MD5 | f8f83b2a98b84f815a84bc823c085cd1
RHSA-2003:042-07.squirrelmail
Posted Mar 7, 2003

Red Hat Security Advisory RHSA-2003:042-07 - SquirrelMail, a PHP based webmail package, has two cross-site scripting vulnerabilities. Version 1.2.10 and earlier are affected.

tags | php, vulnerability, xss
systems | linux, redhat
MD5 | 044bbe0e44d6e613d7d12e2f0d2d3a95
RHSA-2003:073-06.sendmail
Posted Mar 3, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:073-06 - Sendmail v5.79 to 8.12.7 contains a remote root vulnerability in the parsing of mail headers. MTAs other than Sendmail may pass on the carefully crafted message, causing unpatched versions of Sendmail inside a network could still be at risk even if they do not accept external connections directly. In addition, the restricted shell (SMRSH) in Sendmail allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after "||" sequences or "/" characters, which are not properly filtered or verified, allowing local attackers to execute arbitrary binaries via a .forward file.

tags | remote, arbitrary, shell, local, root
systems | linux, redhat
MD5 | 92a4eaafd56a0d789e1b6eea29d888b1
RHSA-2003:015-05.txt
Posted Feb 19, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:015-05 - The rm and mv commands from Fileutils 4.1 and below contain race vulnerabilities which allow local users to delete files and directories as the user running mv or cp if the recursive option is used and the user has write access to any part of the directory tree being moved or deleted.

tags | local, vulnerability
systems | linux, redhat
MD5 | 0063f4b1da2d10272e707ab33fb8b723
RHSA-2003:035-10.txt
Posted Feb 19, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:035-10 - The pam_xauth module included with the pam package v.75 and below contains a local root vulnerability which can be exploited if root is tricked into su'ing to the attackers account.

tags | local, root
systems | linux, redhat
MD5 | 2aebbb67cf7b21e037390dd5c6c3524c
RHSA-2003:029-06.txt
Posted Feb 19, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:029-06 - Lynx v2.8.4 contains a CR/LF injection vulnerability which can lead to faked headers being sent to a web server.

tags | web
systems | linux, redhat
MD5 | 3c2e2258c98bd90adb8a2f309536154e
RHSA-2002:202-33.txt
Posted Feb 13, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002:202-33 - Python v2.2.1 and below has a temp file vulnerability in os._execvpe from os.py which allows local users to execute arbitrary code via a symlink attack.

tags | arbitrary, local, python
systems | linux, redhat
MD5 | f8fb1065914b92d1e79ccb7ea2367933
RHSA-2003:037-09.txt
Posted Feb 7, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:037-09 - Xpdf v2.01 and below contains remote vulnerabilities which allow attackers to execute code via malformed PDF files.

tags | remote, vulnerability
systems | linux, redhat
advisories | CVE-2002-1384
MD5 | e03f78eb9115b7270ce9b4704c58fb50
RHSA-2003:043-12.txt
Posted Feb 7, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:043-12 - A buffer overflow in Window Maker v0.80.0 and earlier allows remote attackers to execute arbitrary code via an image file that is not properly handled when Window Maker uses width and height information to allocate a buffer. This could be exploited by a user opening a malicious theme.

tags | remote, overflow, arbitrary
systems | linux, redhat
MD5 | 07e7d90feb329f560c4b24ac17b0a29b
RHSA-2003:040-07.txt
Posted Feb 7, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002-014 - Libldap and the slapd and slurpd servers that come with OpenLDAP v1.2.13 and below contains local and remote buffer overflow vulnerabilities.

tags | remote, overflow, local, vulnerability
systems | linux, redhat
MD5 | 4b793d2e7f295a2b36b63619350693ce
RHSA-2003:017-06.txt
Posted Feb 5, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:017-06 - Red Hat released new PHP packages that are no longer affected by the wordwrap() heap overflow vulnerability. These packages are available for Red Hat version 8.0.

tags | overflow, php
systems | linux, redhat
advisories | CVE-2002-1396
MD5 | 6921364932b648cd41620bdc9561be65
RHSA-2003:025-20.txt
Posted Feb 5, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:025-20 - Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 have been made available that fix an information leak from several ethernet drivers (reported by Atstake), and a file system issue.

tags | kernel
systems | linux, redhat
advisories | CVE-2003-0001
MD5 | ad4bcd14084f3d01eb9e28be1f56df4e
RHSA-2003:006-06
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2003:006-06 - Unpatched versions of libpng 1.2.1 and earlier do not correctly calculate offsets, which leads to a buffer overflow and arbitrary code execution. This can be exploited by an attacker creating a carefully crafted PNG file which executes arbitrary code when the victim views it.

tags | overflow, arbitrary, code execution
systems | linux, redhat
MD5 | 84720d8fd70f0fd0fc5666b1f88c7383
RHSA-2002:295-07
Posted Jan 17, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002:295-07 - Eight vulnerabilities have been fixed in the CUPS printer software included with Red Hat 7.3 and 8.0.

tags | vulnerability
systems | linux, redhat
MD5 | 718cc1c99119f1e7ee3d025c335c88d4
RHSA-2002:290-07
Posted Jan 10, 2003
Authored by Red Hat Security | Site redhat.com

Red Hat Security Advisory RHSA-2002:290-07 - Ethereal 0.9.7 and earlier allows remote attackers to execute arbitrary code via malformed packets to the LMP, PPP, or TDS dissectors. CVE-2002-1356.

tags | remote, arbitrary
systems | linux, redhat
MD5 | b39599d5680ef58b16068f050e1150be
RHSA-2002:105-09
Posted Jun 6, 2002
Site redhat.com

Red Hat security advisory RHSA-2002:105-09 - Version 9 of ISC BIND prior to 9.2.1 contain a remotely exploitable denial of service vulnerability. This affects Red Hat 7.1, 7.2 and 7.3.

tags | denial of service
systems | linux, redhat
MD5 | 45c38e469e5bb8b5d0fc1088a94ba159
RHSA-2002:083-22
Posted Jun 6, 2002
Site redhat.com

Red Hat security advisory RHSA-2002:083-22 - A vulnerability found in GNU Ghostscript allows command execution through specially crafted portscript files. This affected Red Hat 6.2, 7.0, 7.1, 7.2 and 7.3.

systems | linux, redhat
advisories | CVE-2002-0363
MD5 | 15ce4aa40c4b4feefb559f0a7aa6b9c6
RHSA-2002:084-17
Posted Jun 3, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:084-17 - A format string vulnerability found in the pam_ldap module affected Red Hat versions 6.2, 7.0, 7.1,7.2, and 7.3. Red Hat released fixed packages that can be used to counter this vulnerability.

systems | linux, redhat
MD5 | 7775a68f7c2e87d42c842f0551e3acb4
RHSA-2002:092-11
Posted May 25, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:092-11 - A buffer overflow vulnerability has been found in the WU-IMAP daemon prior to v2001a which can be used to remotely execute code via malformed requests if the attacker has a valid IMAP account. This affects Red Hat 6.2, 7.0, 7.1 and 7.2.

tags | overflow, imap
systems | linux, redhat
MD5 | 559e3ab1cdba14bba00635fd2c897253
RHSA-2002:081-06
Posted May 13, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:081-06 - A bug in utf8 interaction between perl-Digest-MD5 and Perl results in utf8 strings having improper MD5 digests.

tags | perl
systems | linux, redhat
MD5 | 479f7d9877209b9ef5a59353f0927ab9
RHSA-2002:086-05
Posted May 13, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:086-05 - A vulnerability found in the netfilter package can result in a serious information leak that exposes filter rules and network topology information. There is a workaround but no fixes are included in this advisory.

systems | linux, redhat
MD5 | a2c87d77b12871eb289de825414f5a03
RHSA-2002-018.rsync
Posted Feb 2, 2002
Site redhat.com

Red Hat Security Advisory RHSA-2002:018-1 - New rsync packages are available; these fix a remotely exploitable problem in the I/O functions. These include the security patch from the recently released rsync-2.5.2. It is strongly recommended that all users of rsync upgrade to the fixed packages. More info on this bug available here.

systems | linux, redhat
MD5 | 24135f11e8b69edbc44f2dfd12023cc7
RHSA-2001:091-07.elm
Posted Jul 18, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:091-07 - Elm had a buffer overflow when handling very long message-ids. This overwrote other header fields, and could potentially cause more damage. Red Hat Linux 5.2, 6.2, 7 and 7.1 is vulnerable.

tags | overflow
systems | linux, redhat
MD5 | 98632c550d1b5b7d7fa43097c390cbc8
RHSA-2001:069-02.man
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:069-02 - The man package which is included with Red Hat 5.x, 6.x, and 7.0 contains a buffer overflow which allows local users to gain gid=man privileges.

tags | overflow, local
systems | linux, redhat
MD5 | ce2b9bd7d6371d8ebd1881f82fa88b54
Page 1 of 6
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Ukraine Claims It Blocked VPNFilter Attack At Chemical Plant
Posted Jul 13, 2018

tags | headline, malware, cyberwar, scada
Ticketmaster Breach Part Of Massive Card Skimming Campaign
Posted Jul 12, 2018

tags | headline, hacker, privacy, bank, data loss, fraud
Hackers Are Selling Backdoors Into PCs For $10
Posted Jul 12, 2018

tags | headline, hacker, fraud, backdoor
Cambridge Analytica Staff Set Up New Firm
Posted Jul 12, 2018

tags | headline, government, privacy, data loss, fraud, cyberwar, facebook
Stolen Sensitive Drone Files Sold On Dark Web
Posted Jul 12, 2018

tags | headline, hacker, government, data loss, cyberwar
A Curious Tale Of The Priest, The Broker, The Hacked Newswires, And $100 Million Of Insider Trades
Posted Jul 11, 2018

tags | headline, hacker, bank, russia, fraud
The Crypto Currencies That Die Before They Have Bloomed
Posted Jul 11, 2018

tags | headline, bank, fraud, cryptography
Adobe Fixes Over 100 Vulnerabilities In Latest Security Patch Update
Posted Jul 11, 2018

tags | headline, flaw, adobe, patch
Arch Linux PDF Reader Package Poisoned
Posted Jul 11, 2018

tags | headline, malware, backdoor
Looks Like Macy's And Bloomingdale's Got Breached Now
Posted Jul 10, 2018

tags | headline, hacker, privacy, data loss
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close