Vulnerabilities > Debian > Linux > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-03-30 | CVE-2011-1548 | Permissions, Privileges, and Access Controls vulnerability in Gentoo Logrotate The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/. | 6.3 |
2011-01-20 | CVE-2010-4338 | Link Following vulnerability in Jwilk Ocrodjvu 0.4.61 ocrodjvu 0.4.6-1 on Debian GNU/Linux allows local users to modify arbitrary files via a symlink attack on temporary files that are generated when Cuneiform is invoked as the OCR engine. | 6.2 |
2011-01-14 | CVE-2010-4695 | Buffer Errors vulnerability in Catb Gif2Png 2.5.1/2.5.2 A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote attackers to create PNG files in unintended directories via a crafted command-line argument, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018. | 5.0 |
2008-09-18 | CVE-2008-4126 | Configuration vulnerability in Debian Python-Dns PyDNS (aka python-dns) before 2.3.1-5 in Debian GNU/Linux does not use random source ports for DNS requests and does not use random transaction IDs for DNS retries, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. | 6.4 |
2008-09-18 | CVE-2008-4099 | Configuration vulnerability in Debian Python-Dns PyDNS (aka python-dns) before 2.3.1-4 in Debian GNU/Linux does not use random source ports or transaction IDs for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. | 6.4 |