Vulnerabilities > Redhat > Enterprise Linux Desktop > 5

DATE CVE VULNERABILITY TITLE RISK
2014-04-27 CVE-2014-0181 Permissions, Privileges, and Access Controls vulnerability in multiple products
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
local
low complexity
linux opensuse redhat suse CWE-264
2.1
2009-10-01 CVE-2009-2904 Configuration vulnerability in Openbsd Openssh 4.3/4.8
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
6.9
2008-10-03 CVE-2008-3825 Permissions, Privileges, and Access Controls vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop
pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program.
local
redhat CWE-264
4.4
2008-08-27 CVE-2008-3844 Improper Input Validation vulnerability in Openbsd Openssh
Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.
network
redhat openbsd CWE-20
critical
9.3
2008-05-23 CVE-2008-1767 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Redhat products
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
network
low complexity
redhat CWE-119
7.5
2008-05-23 CVE-2007-5496 Cross-Site Scripting vulnerability in Selinux Setroubleshoot 2.0.5
Cross-site scripting (XSS) vulnerability in setroubleshoot 2.0.5 allows local users to inject arbitrary web script or HTML via a crafted (1) file or (2) process name, which triggers an Access Vector Cache (AVC) log entry in a log file used during composition of HTML documents for sealert.
1.9
2008-05-23 CVE-2007-5495 Link Following vulnerability in Selinux Setroubleshoot 2.0.5
sealert in setroubleshoot 2.0.5 allows local users to overwrite arbitrary files via a symlink attack on the sealert.log temporary file.
4.4