Vulnerabilities > CVE-2005-0086 - Unspecified vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2005-068.NASL |
description | An updated less package that fixes segmentation fault when viewing binary files is now available. The less utility is a text file browser that resembles more, but has extended capabilities. Victor Ashik discovered a heap based buffer overflow in less, caused by a patch added to the less package in Red Hat Enterprise Linux 3. An attacker could construct a carefully crafted file that could cause less to crash or possibly execute arbitrary code when opened. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0086 to this issue. Note that this issue only affects the version of less distributed with Red Hat Enterprise Linux 3. Red Hat believes that the Exec-Shield technology (enabled by default since Update 3) will block attempts to remotely exploit this vulnerability on x86 architectures. All users of the less package should upgrade to this updated package, which resolves this issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16264 |
published | 2005-01-26 |
reporter | This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/16264 |
title | RHEL 3 : less (RHSA-2005:068) |
code |
|
Oval
accepted | 2013-04-29T04:10:52.092-04:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale. | ||||||||
family | unix | ||||||||
id | oval:org.mitre.oval:def:11027 | ||||||||
status | accepted | ||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||
title | Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands. | ||||||||
version | 25 |
Redhat
advisories |
| ||||
rpms |
|
References
- http://www.redhat.com/support/errata/RHSA-2005-068.html
- https://bugzilla.fedora.us/show_bug.cgi?id=2404
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19131
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11027