Vulnerabilities > Redhat

DATE CVE VULNERABILITY TITLE RISK
2008-02-25 CVE-2008-0932 Improper Input Validation vulnerability in the Sword Project Diatheke Front END and Sword
diatheke.pl in The SWORD Project Diatheke 1.5.9 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the range parameter.
network
low complexity
debian redhat the-sword-project CWE-20
7.5
2008-02-11 CVE-2008-0668 Numeric Errors vulnerability in Gnome Gnumeric
The excel_read_HLINK function in plugins/excel/ms-excel-read.c in Gnome Office Gnumeric before 1.8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted XLS file containing XLS HLINK opcodes, possibly because of an integer signedness error that leads to an integer overflow.
network
redhat gnome CWE-189
critical
9.3
2008-02-05 CVE-2007-4130 Improper Input Validation vulnerability in Redhat Enterprise Linux and Enterprise Linux Desktop
The Linux kernel 2.6.9 before 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND operation.
local
low complexity
redhat CWE-20
7.2
2008-01-08 CVE-2008-0003 Buffer Errors vulnerability in Openpegasus Management Server 2.6.1
Stack-based buffer overflow in the PAMBasicAuthenticator::PAMCallback function in OpenPegasus CIM management server (tog-pegasus), when compiled to use PAM and without PEGASUS_USE_PAM_STANDALONE_PROC defined, might allow remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2007-5360.
network
low complexity
redhat openpegasus CWE-119
critical
10.0
2007-12-20 CVE-2007-6285 Configuration vulnerability in Redhat Enterprise Linux 4.0/5.0
The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by operating a remote NFS server and creating special device files on that server, as demonstrated by the /dev/mem device.
local
high complexity
redhat CWE-16
6.2
2007-12-18 CVE-2007-6283 Information Exposure vulnerability in multiple products
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows local users to perform unauthorized named commands, such as causing a denial of service by stopping named.
local
low complexity
redhat fedoraproject oracle centos CWE-200
4.9
2007-12-13 CVE-2007-5964 Configuration vulnerability in Redhat Enterprise Linux 5.0
The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server.
local
redhat CWE-16
6.9
2007-12-03 CVE-2006-7226 Denial Of Service vulnerability in PCRE Perl Compatible Regular Expression Subpattern Memory Allocation
Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
network
redhat
4.3
2007-11-30 CVE-2007-5494 Resource Management Errors vulnerability in Redhat Enterprise Linux 4.0/5.0
Memory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
local
low complexity
redhat CWE-399
4.9
2007-11-30 CVE-2007-6181 Buffer Errors vulnerability in Redhat Cygwin 1.5.19/1.5.7/1.5.71
Heap-based buffer overflow in cygwin1.dll in Cygwin 1.5.7 and earlier allows context-dependent attackers to execute arbitrary code via a filename with a certain length, as demonstrated by a remote authenticated user who uses the SCP protocol to send a file to the Cygwin machine, and thereby causes scp.exe on this machine to execute, and then overwrite heap memory with characters from the filename.
network
redhat CWE-119
8.5