Vulnerabilities > GNU

DATE CVE VULNERABILITY TITLE RISK
2011-03-02 CVE-2010-4756 Resource Management Errors vulnerability in GNU Glibc
The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
network
low complexity
gnu CWE-399
4.0
2011-01-14 CVE-2010-4337 Link Following vulnerability in GNU Gnash 0.8.8
The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.
local
gnu CWE-59
3.3
2011-01-13 CVE-2010-4052 Resource Management Errors vulnerability in GNU Glibc
Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
network
low complexity
gnu CWE-399
5.0
2010-10-14 CVE-2010-3192 Information Exposure vulnerability in GNU Glibc
Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
network
low complexity
gnu CWE-200
5.0
2010-07-22 CVE-2010-2056 Link Following vulnerability in GNU GV
GNU gv before 3.7.0 allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
local
gnu CWE-59
3.3
2010-07-06 CVE-2010-2252 Improper Input Validation vulnerability in GNU Wget
GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
network
gnu CWE-20
6.8
2010-04-16 CVE-2010-1161 Race Condition vulnerability in GNU Nano
Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.
local
high complexity
gnu CWE-362
3.7
2010-04-16 CVE-2010-1160 Link Following vulnerability in GNU Nano
GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being edited by the victim.
local
gnu CWE-59
1.9
2010-04-05 CVE-2010-0825 Permissions, Privileges, and Access Controls vulnerability in GNU Emacs
lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.
local
gnu CWE-264
4.4
2010-03-26 CVE-2010-0731 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in GNU Gnutls
The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
network
low complexity
gnu CWE-119
7.5