Vulnerabilities > Redhat

DATE CVE VULNERABILITY TITLE RISK
2014-04-07 CVE-2014-0160 Out-of-bounds Read vulnerability in multiple products
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
7.5
2014-04-03 CVE-2014-0093 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Enterprise Application Platform 6.2.2
Red Hat JBoss Enterprise Application Platform (JBEAP) 6.2.2, when using a Java Security Manager (JSM), does not properly apply permissions defined by a policy file, which causes applications to be granted the java.security.AllPermission permission and allows remote attackers to bypass intended access restrictions.
network
redhat CWE-264
5.8
2014-04-01 CVE-2013-1869 Improper Input Validation vulnerability in Redhat Satellite and Spacewalk-Java
CRLF injection vulnerability in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 5.6 allows remote attackers to inject arbitrary HTTP headers, and conduct HTTP response splitting attacks and cross-site scripting (XSS) attacks, via the return_url parameter.
network
redhat CWE-20
4.3
2014-04-01 CVE-2012-0032 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 3.0.1 uses 0777 permissions for the root directory when installing a remote client, which allows local users to read or modify subdirectories and files within the root directory, as demonstrated by obtaining JON credentials.
local
high complexity
redhat CWE-264
3.7
2014-04-01 CVE-2011-4573 Permissions, Privileges, and Access Controls vulnerability in Redhat Jboss Operations Network
Red Hat JBoss Operations Network (JON) before 2.4.2 does not properly enforce "modify resource" permissions for remote authenticated users when deleting a plug-in configuration update from the group connection properties history, which prevents such activities from being recorded in the audit trail.
network
redhat CWE-264
3.5
2014-03-31 CVE-2014-0086 Improper Input Validation vulnerability in Redhat Jboss web Framework KIT and Richfaces
The doFilter function in webapp/PushHandlerFilter.java in JBoss RichFaces 4.3.4, 4.3.5, and 5.x allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a large number of malformed atmosphere push requests.
network
redhat CWE-20
4.3
2014-03-31 CVE-2013-7347 Permissions, Privileges, and Access Controls vulnerability in Redhat Conga and Enterprise Linux
Luci in Red Hat Conga does not properly enforce the user session timeout, which might allow attackers to gain access to the session by reading the __ac session cookie.
local
high complexity
redhat CWE-264
3.7
2014-03-26 CVE-2014-0055 Denial of Service vulnerability in Redhat Enterprise Linux 6.0
The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
low complexity
redhat
5.5
2014-03-19 CVE-2014-1514 Out-Of-Bounds Write vulnerability in multiple products
vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
7.5
2014-03-19 CVE-2014-1513 Out-Of-Bounds Write vulnerability in multiple products
TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
9.3