text
stringlengths 580
8.32k
|
---|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0199
Discovered date: 2020-10-06T00:00:00+00:00
Public date: 1999-11-09T00:00:00+00:00
Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999....
Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199
- RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775
- External: https://www.cve.org/CVERecord?id=CVE-1999-0199
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199
CWE: CWE-1053 (Missing Documentation for Design)
Exploit exists: False
Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5)
- Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0199
Discovered date: 2020-10-06T00:00:00+00:00
Public date: 1999-11-09T00:00:00+00:00
Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999....
Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199
- RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775
- External: https://www.cve.org/CVERecord?id=CVE-1999-0199
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199
CWE: CWE-1053 (Missing Documentation for Design)
Exploit exists: False
Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6)
- Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0199
Discovered date: 2020-10-06T00:00:00+00:00
Public date: 1999-11-09T00:00:00+00:00
Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999....
Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199
- RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775
- External: https://www.cve.org/CVERecord?id=CVE-1999-0199
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199
CWE: CWE-1053 (Missing Documentation for Design)
Exploit exists: False
Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7)
- Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0199
Discovered date: 2020-10-06T00:00:00+00:00
Public date: 1999-11-09T00:00:00+00:00
Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root
Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999....
Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue.
This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199
- RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775
- External: https://www.cve.org/CVERecord?id=CVE-1999-0199
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199
CWE: CWE-1053 (Missing Documentation for Design)
Exploit exists: False
Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8)
- Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat Advanced Cluster Management for Kubernetes 2 (cpe:/a:redhat:acm:2)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl097a?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/ovmf?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8)
- Not Affected: pkg:rpm/redhat/compat-openssl10?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/mingw-openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat JBoss Core Services (cpe:/a:redhat:jboss_core_services:1)
- Not Affected: N/A (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat JBoss Enterprise Application Platform 5 (cpe:/a:redhat:jboss_enterprise_application_platform:5)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat JBoss Enterprise Application Platform 6 (cpe:/a:redhat:jboss_enterprise_application_platform:6)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0428
Discovered date: 2020-10-13T00:00:00+00:00
Public date: 1999-03-22T00:00:00+00:00
Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls
Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls....
Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428
- RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836
- External: https://www.cve.org/CVERecord?id=CVE-1999-0428
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428
CWE: CWE-384 (Session Fixation)
Exploit exists: False
Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2)
- Not Affected: N/A (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux AS version 4 (cpe:/o:redhat:enterprise_linux:4::as)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux Desktop version 4 (cpe:/o:redhat:enterprise_linux:4::desktop)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux ES version 4 (cpe:/o:redhat:enterprise_linux:4::es)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-0710
Discovered date: 2005-04-26T00:00:00+00:00
Public date: 1999-07-25T00:00:00+00:00
Summary: security flaw
Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710
- RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452
- External: https://www.cve.org/CVERecord?id=CVE-1999-0710
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710
Exploit exists: False
Product: Red Hat Enterprise Linux WS version 4 (cpe:/o:redhat:enterprise_linux:4::ws)
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low
- Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as)
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop)
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es)
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws)
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux AS version 4 (cpe:/o:redhat:enterprise_linux:4::as)
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux Desktop version 4 (cpe:/o:redhat:enterprise_linux:4::desktop)
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux ES version 4 (cpe:/o:redhat:enterprise_linux:4::es)
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-1999-1572
Discovered date: 2005-11-01T00:00:00+00:00
Public date: 1996-07-16T00:00:00+00:00
Summary: security flaw
Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572
- RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458
- External: https://www.cve.org/CVERecord?id=CVE-1999-1572
- External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572
Acknowledgments:
- Contributor: Mike O'Connor
Exploit exists: False
Product: Red Hat Enterprise Linux WS version 4 (cpe:/o:redhat:enterprise_linux:4::ws)
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low
- Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low
- Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-0715
Public date: 2000-08-05T00:00:00+00:00
Summary: security flaw
Description: DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-0715
- RHBZ#1616507: https://bugzilla.redhat.com/show_bug.cgi?id=1616507
- External: https://www.cve.org/CVERecord?id=CVE-2000-0715
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-0715
Exploit exists: False
Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-0715
Public date: 2000-08-05T00:00:00+00:00
Summary: security flaw
Description: DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-0715
- RHBZ#1616507: https://bugzilla.redhat.com/show_bug.cgi?id=1616507
- External: https://www.cve.org/CVERecord?id=CVE-2000-0715
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-0715
Exploit exists: False
Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1134
Public date: 2000-10-28T00:00:00+00:00
Summary: security flaw
Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack....
Statement: This issue was fixed in the following products:
- Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27)
- Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30)
- Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30)
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134
- RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537
- External: https://www.cve.org/CVERecord?id=CVE-2000-1134
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134
Exploit exists: False
Product: Red Hat Linux 7.0j (cpe:/o:redhat:linux:7.0j)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1137
Public date: 2000-11-29T00:00:00+00:00
Summary: security flaw
Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137
- RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538
- External: https://www.cve.org/CVERecord?id=CVE-2000-1137
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1137
Public date: 2000-11-29T00:00:00+00:00
Summary: security flaw
Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137
- RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538
- External: https://www.cve.org/CVERecord?id=CVE-2000-1137
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137
Exploit exists: False
Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1137
Public date: 2000-11-29T00:00:00+00:00
Summary: security flaw
Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137
- RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538
- External: https://www.cve.org/CVERecord?id=CVE-2000-1137
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137
Exploit exists: False
Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1137
Public date: 2000-11-29T00:00:00+00:00
Summary: security flaw
Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137
- RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538
- External: https://www.cve.org/CVERecord?id=CVE-2000-1137
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1137
Public date: 2000-11-29T00:00:00+00:00
Summary: security flaw
Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack....
Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137
- RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538
- External: https://www.cve.org/CVERecord?id=CVE-2000-1137
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1191
Discovered date: 2006-12-06T00:00:00+00:00
Public date: 2000-04-18T00:00:00+00:00
Summary: security flaw
Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191
- RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546
- External: https://www.cve.org/CVERecord?id=CVE-2000-1191
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191
Exploit exists: False
Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as)
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1191
Discovered date: 2006-12-06T00:00:00+00:00
Public date: 2000-04-18T00:00:00+00:00
Summary: security flaw
Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191
- RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546
- External: https://www.cve.org/CVERecord?id=CVE-2000-1191
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191
Exploit exists: False
Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop)
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1191
Discovered date: 2006-12-06T00:00:00+00:00
Public date: 2000-04-18T00:00:00+00:00
Summary: security flaw
Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191
- RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546
- External: https://www.cve.org/CVERecord?id=CVE-2000-1191
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191
Exploit exists: False
Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es)
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1191
Discovered date: 2006-12-06T00:00:00+00:00
Public date: 2000-04-18T00:00:00+00:00
Summary: security flaw
Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191
- RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546
- External: https://www.cve.org/CVERecord?id=CVE-2000-1191
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191
Exploit exists: False
Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws)
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low
- Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1211
Public date: 2000-12-22T00:00:00+00:00
Summary: security flaw
Description: Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1211
- RHBZ#1616549: https://bugzilla.redhat.com/show_bug.cgi?id=1616549
- External: https://www.cve.org/CVERecord?id=CVE-2000-1211
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1211
Exploit exists: False
Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1211
Public date: 2000-12-22T00:00:00+00:00
Summary: security flaw
Description: Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1211
- RHBZ#1616549: https://bugzilla.redhat.com/show_bug.cgi?id=1616549
- External: https://www.cve.org/CVERecord?id=CVE-2000-1211
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1211
Exploit exists: False
Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1212
Public date: 2000-12-18T00:00:00+00:00
Summary: security flaw
Description: Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1212
- RHBZ#1616550: https://bugzilla.redhat.com/show_bug.cgi?id=1616550
- External: https://www.cve.org/CVERecord?id=CVE-2000-1212
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1212
Exploit exists: False
Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1212
Public date: 2000-12-18T00:00:00+00:00
Summary: security flaw
Description: Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1212
- RHBZ#1616550: https://bugzilla.redhat.com/show_bug.cgi?id=1616550
- External: https://www.cve.org/CVERecord?id=CVE-2000-1212
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1212
Exploit exists: False
Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl097a?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
- Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat JBoss Enterprise Application Platform 6 (cpe:/a:redhat:jboss_enterprise_application_platform:6)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat JBoss Enterprise Web Server 1 (cpe:/a:redhat:jboss_enterprise_web_server:1)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2000-1254
Discovered date: 2016-05-04T00:00:00+00:00
Public date: 2000-06-01T00:00:00+00:00
Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254
- RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287
- External: https://www.cve.org/CVERecord?id=CVE-2000-1254
- External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254
Exploit exists: False
Product: Red Hat JBoss Enterprise Web Server 3 (cpe:/a:redhat:jboss_enterprise_web_server:3)
- Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0010
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010
- RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555
- External: https://www.cve.org/CVERecord?id=CVE-2001-0010
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0010
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010
- RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555
- External: https://www.cve.org/CVERecord?id=CVE-2001-0010
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0010
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010
- RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555
- External: https://www.cve.org/CVERecord?id=CVE-2001-0010
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0012
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012
- RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557
- External: https://www.cve.org/CVERecord?id=CVE-2001-0012
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0012
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012
- RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557
- External: https://www.cve.org/CVERecord?id=CVE-2001-0012
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0012
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012
- RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557
- External: https://www.cve.org/CVERecord?id=CVE-2001-0012
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0011
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011
- RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556
- External: https://www.cve.org/CVERecord?id=CVE-2001-0011
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0011
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011
- RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556
- External: https://www.cve.org/CVERecord?id=CVE-2001-0011
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0011
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011
- RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556
- External: https://www.cve.org/CVERecord?id=CVE-2001-0011
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0013
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013
- RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558
- External: https://www.cve.org/CVERecord?id=CVE-2001-0013
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0013
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013
- RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558
- External: https://www.cve.org/CVERecord?id=CVE-2001-0013
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0013
Public date: 2001-01-29T00:00:00+00:00
Summary: security flaw
Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013
- RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558
- External: https://www.cve.org/CVERecord?id=CVE-2001-0013
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0036
Public date: 2000-12-08T00:00:00+00:00
Summary: security flaw
Description: KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0036
- RHBZ#1616560: https://bugzilla.redhat.com/show_bug.cgi?id=1616560
- External: https://www.cve.org/CVERecord?id=CVE-2001-0036
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0036
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0036
Public date: 2000-12-08T00:00:00+00:00
Summary: security flaw
Description: KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0036
- RHBZ#1616560: https://bugzilla.redhat.com/show_bug.cgi?id=1616560
- External: https://www.cve.org/CVERecord?id=CVE-2001-0036
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0036
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0060
Public date: 2000-12-18T00:00:00+00:00
Summary: security flaw
Description: Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0060
- RHBZ#1616562: https://bugzilla.redhat.com/show_bug.cgi?id=1616562
- External: https://www.cve.org/CVERecord?id=CVE-2001-0060
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0060
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0066
Public date: 2000-11-26T00:00:00+00:00
Summary: security flaw
Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066
- RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563
- External: https://www.cve.org/CVERecord?id=CVE-2001-0066
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066
Exploit exists: False
Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0066
Public date: 2000-11-26T00:00:00+00:00
Summary: security flaw
Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066
- RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563
- External: https://www.cve.org/CVERecord?id=CVE-2001-0066
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066
Exploit exists: False
Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0066
Public date: 2000-11-26T00:00:00+00:00
Summary: security flaw
Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066
- RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563
- External: https://www.cve.org/CVERecord?id=CVE-2001-0066
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0066
Public date: 2000-11-26T00:00:00+00:00
Summary: security flaw
Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066
- RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563
- External: https://www.cve.org/CVERecord?id=CVE-2001-0066
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0071
Public date: 2000-12-19T00:00:00+00:00
Summary: security flaw
Description: gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0071
- RHBZ#1616564: https://bugzilla.redhat.com/show_bug.cgi?id=1616564
- External: https://www.cve.org/CVERecord?id=CVE-2001-0071
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0071
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0071
Public date: 2000-12-19T00:00:00+00:00
Summary: security flaw
Description: gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0071
- RHBZ#1616564: https://bugzilla.redhat.com/show_bug.cgi?id=1616564
- External: https://www.cve.org/CVERecord?id=CVE-2001-0071
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0071
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0072
Public date: 2000-12-19T00:00:00+00:00
Summary: security flaw
Description: gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0072
- RHBZ#1616565: https://bugzilla.redhat.com/show_bug.cgi?id=1616565
- External: https://www.cve.org/CVERecord?id=CVE-2001-0072
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0072
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0072
Public date: 2000-12-19T00:00:00+00:00
Summary: security flaw
Description: gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0072
- RHBZ#1616565: https://bugzilla.redhat.com/show_bug.cgi?id=1616565
- External: https://www.cve.org/CVERecord?id=CVE-2001-0072
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0072
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0108
Public date: 2001-01-12T00:00:00+00:00
Summary: security flaw
Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108
- RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567
- External: https://www.cve.org/CVERecord?id=CVE-2001-0108
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0108
Public date: 2001-01-12T00:00:00+00:00
Summary: security flaw
Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108
- RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567
- External: https://www.cve.org/CVERecord?id=CVE-2001-0108
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108
Exploit exists: False
Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0108
Public date: 2001-01-12T00:00:00+00:00
Summary: security flaw
Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108
- RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567
- External: https://www.cve.org/CVERecord?id=CVE-2001-0108
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108
Exploit exists: False
Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0108
Public date: 2001-01-12T00:00:00+00:00
Summary: security flaw
Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108
- RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567
- External: https://www.cve.org/CVERecord?id=CVE-2001-0108
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0108
Public date: 2001-01-12T00:00:00+00:00
Summary: security flaw
Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108
- RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567
- External: https://www.cve.org/CVERecord?id=CVE-2001-0108
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0117
Public date: 2001-01-10T00:00:00+00:00
Summary: security flaw
Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117
- RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568
- External: https://www.cve.org/CVERecord?id=CVE-2001-0117
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0117
Public date: 2001-01-10T00:00:00+00:00
Summary: security flaw
Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117
- RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568
- External: https://www.cve.org/CVERecord?id=CVE-2001-0117
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117
Exploit exists: False
Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2)
- Fixed: N/A (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0117
Public date: 2001-01-10T00:00:00+00:00
Summary: security flaw
Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117
- RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568
- External: https://www.cve.org/CVERecord?id=CVE-2001-0117
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117
Exploit exists: False
Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0)
- Fixed: N/A (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0117
Public date: 2001-01-10T00:00:00+00:00
Summary: security flaw
Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117
- RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568
- External: https://www.cve.org/CVERecord?id=CVE-2001-0117
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117
Exploit exists: False
Product: Red Hat Linux 7.1 (cpe:/o:redhat:linux:7.1)
- Fixed: N/A (Impact: Low
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0128
Public date: 2000-12-16T00:00:00+00:00
Summary: security flaw
Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128
- RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569
- External: https://www.cve.org/CVERecord?id=CVE-2001-0128
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128
Exploit exists: False
Product: Red Hat Powertools 6.1 (cpe:/a:redhat:powertools:6.1)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0128
Public date: 2000-12-16T00:00:00+00:00
Summary: security flaw
Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128
- RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569
- External: https://www.cve.org/CVERecord?id=CVE-2001-0128
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128
Exploit exists: False
Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0128
Public date: 2000-12-16T00:00:00+00:00
Summary: security flaw
Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128
- RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569
- External: https://www.cve.org/CVERecord?id=CVE-2001-0128
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128
Exploit exists: False
Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5)
- Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6)
- Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7)
- Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8)
- Not Affected: pkg:rpm/redhat/httpd@2.4?arch=src&rpmmod=httpd:2.4 (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat JBoss Core Services (cpe:/a:redhat:jboss_core_services:1)
- Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2)
- Affected / Out of support scope: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
- Affected / Out of support scope: N/A (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0131
Discovered date: 2020-10-09T00:00:00+00:00
Public date: 2001-01-10T00:00:00+00:00
Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack
Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity....
Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131
- RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967
- External: https://www.cve.org/CVERecord?id=CVE-2001-0131
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131
CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following'))
Exploit exists: False
Product: Red Hat Software Collections (cpe:/a:redhat:rhel_software_collections:3)
- Not Affected: pkg:rpm/redhat/httpd24-httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
END_VULNERABILITY
|
BEGIN_VULNERABILITY
CVE ID: CVE-2001-0141
Public date: 2001-01-10T00:00:00+00:00
Summary: security flaw
Description: mgetty 1.1.22 allows local users to overwrite arbitrary files via a symlink attack in some configurations....
References:
- Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0141
- RHBZ#1616570: https://bugzilla.redhat.com/show_bug.cgi?id=1616570
- External: https://www.cve.org/CVERecord?id=CVE-2001-0141
- External: https://nvd.nist.gov/vuln/detail/CVE-2001-0141
Exploit exists: False
Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2)
- Fixed: N/A (Impact: None
END_VULNERABILITY
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.