Vulnerabilities > Redhat > Enterprise Linux > Low

DATE CVE VULNERABILITY TITLE RISK
2012-08-16 CVE-2012-4290 Resource Management Errors vulnerability in multiple products
The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
3.3
2012-08-16 CVE-2012-4291 Resource Management Errors vulnerability in multiple products
The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
3.3
2012-04-11 CVE-2012-0042 Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c. 2.9
2010-06-07 CVE-2010-1439 Permissions, Privileges, and Access Controls vulnerability in Redhat Yum-Rhn-Plugin
yum-rhn-plugin in Red Hat Network Client Tools (aka rhn-client-tools) on Red Hat Enterprise Linux (RHEL) 5 and Fedora uses world-readable permissions for the /var/spool/up2date/loginAuth.pkl file, which allows local users to access the Red Hat Network profile, and possibly prevent future security updates, by leveraging authentication data from this file.
local
low complexity
redhat fedoraproject CWE-264
3.6
2010-05-12 CVE-2010-0730 Improper Input Validation vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop
The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulation.
network
high complexity
redhat linux CWE-20
2.6
2008-08-18 CVE-2008-3270 Cryptographic Issues vulnerability in Redhat Enterprise Linux 5.0
yum-rhn-plugin in Red Hat Enterprise Linux (RHEL) 5 does not verify the SSL certificate for a file download from a Red Hat Network (RHN) server, which makes it easier for remote man-in-the-middle attackers to cause a denial of service (loss of updates) or force the download and installation of official Red Hat packages that were not requested.
network
high complexity
redhat CWE-310
2.6
2008-05-23 CVE-2007-5496 Cross-Site Scripting vulnerability in Selinux Setroubleshoot 2.0.5
Cross-site scripting (XSS) vulnerability in setroubleshoot 2.0.5 allows local users to inject arbitrary web script or HTML via a crafted (1) file or (2) process name, which triggers an Access Vector Cache (AVC) log entry in a log file used during composition of HTML documents for sealert.
1.9
2008-05-14 CVE-2008-1943 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Xensource XEN
Buffer overflow in the backend of XenSource Xen Para Virtualized Frame Buffer (PVFB) 3.0 through 3.1.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted description of a shared framebuffer.
local
low complexity
redhat xensource CWE-119
2.1
2007-11-10 CVE-2007-4570 Improper Input Validation vulnerability in Redhat Mcstrans 0.2.3
Algorithmic complexity vulnerability in the MCS translation daemon in mcstrans 0.2.3 allows local users to cause a denial of service (temporary daemon outage) via a large range of compartments in sensitivity labels.
local
redhat CWE-20
1.9
2007-11-08 CVE-2007-4129 Link Following vulnerability in Fedoraproject Coolkey 1.1.0
CoolKey 1.1.0 allows local users to overwrite arbitrary files via a symlink attack on temporary files in the /tmp/.pk11ipc1/ directory.
3.3