Vulnerabilities > Redhat > Linux > 6.2

DATE CVE VULNERABILITY TITLE RISK
2001-06-02 CVE-2001-0309 Unspecified vulnerability in Redhat Linux 6.2
inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services.
network
low complexity
redhat
5.0
2001-05-28 CVE-2001-1028 Unspecified vulnerability in Redhat Linux
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.
local
low complexity
redhat
7.2
2001-03-26 CVE-2001-0233 Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
network
low complexity
matthew-smith debian redhat
critical
10.0
2001-03-26 CVE-2001-0197 Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands.
network
low complexity
icecast redhat
critical
10.0
2001-03-26 CVE-2001-0169 When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
local
low complexity
mandrakesoft redhat trustix turbolinux
2.1
2001-03-12 CVE-2001-0128 Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. 7.2
2001-01-09 CVE-2000-1189 Unspecified vulnerability in Redhat Linux
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.
local
low complexity
redhat
7.2
2001-01-09 CVE-2000-1134 Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. 7.2
2001-01-09 CVE-2000-1125 Unspecified vulnerability in Redhat Linux 6.2/6.2E
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
local
low complexity
redhat
7.2
2000-12-11 CVE-2000-1009 dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
local
low complexity
redhat trustix
7.2