Vulnerabilities > Fedoraproject > Low

DATE CVE VULNERABILITY TITLE RISK
2012-10-10 CVE-2012-3504 Permissions, Privileges, and Access Controls vulnerability in Fedoraproject Crypto-Utils 2.4.134
The nssconfigFound function in genkey.pl in crypto-utils 2.4.1-34 allows local users to overwrite arbitrary files via a symlink attack on the "list" file in the current working directory.
local
low complexity
fedoraproject CWE-264
3.6
2012-07-03 CVE-2012-0833 Permissions, Privileges, and Access Controls vulnerability in Fedoraproject 389 Directory Server
The acllas__handle_group_entry function in servers/plugins/acl/acllas.c in 389 Directory Server before 1.2.10 does not properly handled access control instructions (ACIs) that use certificate groups, which allows remote authenticated LDAP users with a certificate group to cause a denial of service (infinite loop and CPU consumption) by binding to the server.
2.3
2012-07-03 CVE-2012-2678 Cryptographic Issues vulnerability in multiple products
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), after the password for a LDAP user has been changed and before the server has been reset, allows remote attackers to read the plaintext password via the unhashed#user#password attribute.
local
high complexity
redhat fedoraproject CWE-310
1.2
2012-07-03 CVE-2012-2746 Cryptographic Issues vulnerability in multiple products
389 Directory Server before 1.2.11.6 (aka Red Hat Directory Server before 8.2.10-3), when the password of a LDAP user has been changed and audit logging is enabled, saves the new password to the log in plain text, which allows remote authenticated users to read the password.
network
high complexity
redhat fedoraproject CWE-310
2.1
2011-06-14 CVE-2011-1943 Information Exposure Through Log Files vulnerability in multiple products
The destroy_one_secret function in nm-setting-vpn.c in libnm-util in the NetworkManager package 0.8.999-3.git20110526 in Fedora 15 creates a log entry containing a certificate password, which allows local users to obtain sensitive information by reading a log file.
local
low complexity
gnome fedoraproject CWE-532
2.1
2011-01-25 CVE-2010-4341 Resource Management Errors vulnerability in multiple products
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
local
low complexity
fedorahosted fedoraproject CWE-399
2.1
2010-07-13 CVE-2010-2008 Command Injection vulnerability in multiple products
MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a .
3.5
2010-06-07 CVE-2010-1439 Permissions, Privileges, and Access Controls vulnerability in Redhat Yum-Rhn-Plugin
yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file.
local
low complexity
redhat fedoraproject CWE-264
3.6
2010-01-14 CVE-2010-0014 Improper Authentication vulnerability in Fedoraproject Sssd
System Security Services Daemon (SSSD) before 1.0.1, when the krb5 auth_provider is configured but the KDC is unreachable, allows physically proximate attackers to authenticate, via an arbitrary password, to the screen-locking program on a workstation that has any user's Kerberos ticket-granting ticket (TGT); and might allow remote attackers to bypass intended access restrictions via vectors involving an arbitrary password in conjunction with a valid TGT.
local
high complexity
fedoraproject CWE-287
3.7
2007-11-08 CVE-2007-4129 Link Following vulnerability in Fedoraproject Coolkey 1.1.0
CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
3.3