text
stringlengths
580
8.32k
BEGIN_VULNERABILITY CVE ID: CVE-1999-0199 Discovered date: 2020-10-06T00:00:00+00:00 Public date: 1999-11-09T00:00:00+00:00 Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.... Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199 - RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775 - External: https://www.cve.org/CVERecord?id=CVE-1999-0199 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199 CWE: CWE-1053 (Missing Documentation for Design) Exploit exists: False Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5) - Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0199 Discovered date: 2020-10-06T00:00:00+00:00 Public date: 1999-11-09T00:00:00+00:00 Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.... Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199 - RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775 - External: https://www.cve.org/CVERecord?id=CVE-1999-0199 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199 CWE: CWE-1053 (Missing Documentation for Design) Exploit exists: False Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6) - Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0199 Discovered date: 2020-10-06T00:00:00+00:00 Public date: 1999-11-09T00:00:00+00:00 Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.... Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199 - RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775 - External: https://www.cve.org/CVERecord?id=CVE-1999-0199 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199 CWE: CWE-1053 (Missing Documentation for Design) Exploit exists: False Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7) - Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0199 Discovered date: 2020-10-06T00:00:00+00:00 Public date: 1999-11-09T00:00:00+00:00 Summary: glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root Description: manual/search.texi in the GNU C Library (aka glibc) before 2.2 lacks a statement about the unspecified tdelete return value upon deletion of a tree's root, which might allow attackers to access a dangling pointer in an application whose developer was unaware of a documentation update from 1999.... Statement: Red Hat Product Security does not feel that this issue has any security impact because the CVE description suggests that a missing statement in the manpage could lead to a generalized developer awareness problem, that in turn could potentially lead to a flaw. Thus, there is no actual exploitable vulnerability reported in this CVE, but rather, the possibility that one could occur in some *unspecified* software which uses glibc where the developers haven't read the manpage since 1999. There is no direct way for a vulnerability to come to fruition in software based solely on developer knowledge (or lack thereof), but an *implementation* of that knowledge, which is absent from the description of this issue. This manpage issue does not affect glibc as shipped with Red Hat Enterprise Linux 5, 6, 7, or 8 as the versions of glibc shipped already have the updated manpage. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0199 - RHBZ#1885775: https://bugzilla.redhat.com/show_bug.cgi?id=1885775 - External: https://www.cve.org/CVERecord?id=CVE-1999-0199 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0199 CWE: CWE-1053 (Missing Documentation for Design) Exploit exists: False Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8) - Not Affected: pkg:rpm/redhat/glibc?arch=src (Impact: None, CVSS: CVSSv3.1: 0.0 / AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat Advanced Cluster Management for Kubernetes 2 (cpe:/a:redhat:acm:2) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl097a?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/ovmf?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8) - Not Affected: pkg:rpm/redhat/compat-openssl10?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/mingw-openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat JBoss Core Services (cpe:/a:redhat:jboss_core_services:1) - Not Affected: N/A (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat JBoss Enterprise Application Platform 5 (cpe:/a:redhat:jboss_enterprise_application_platform:5) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat JBoss Enterprise Application Platform 6 (cpe:/a:redhat:jboss_enterprise_application_platform:6) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0428 Discovered date: 2020-10-13T00:00:00+00:00 Public date: 1999-03-22T00:00:00+00:00 Summary: openssl: allow remote attackers to reuse SSL sessions and bypass access controls Description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.... Statement: OpenSSL, as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, is not affected by this flaw because newer versions of OpenSSL that have already been patched are shipped. This vulnerability was originally published over 20 years ago. It affects OpenSSL versions < 0.92b, which are not shipped in Red Hat products. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0428 - RHBZ#1891836: https://bugzilla.redhat.com/show_bug.cgi?id=1891836 - External: https://www.cve.org/CVERecord?id=CVE-1999-0428 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0428 CWE: CWE-384 (Session Fixation) Exploit exists: False Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2) - Not Affected: N/A (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv3.1: 6.5 / AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE3-6.3E.13?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux AS version 4 (cpe:/o:redhat:enterprise_linux:4::as) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux Desktop version 4 (cpe:/o:redhat:enterprise_linux:4::desktop) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux ES version 4 (cpe:/o:redhat:enterprise_linux:4::es) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-0710 Discovered date: 2005-04-26T00:00:00+00:00 Public date: 1999-07-25T00:00:00+00:00 Summary: security flaw Description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-0710 - RHBZ#1616452: https://bugzilla.redhat.com/show_bug.cgi?id=1616452 - External: https://www.cve.org/CVERecord?id=CVE-1999-0710 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-0710 Exploit exists: False Product: Red Hat Enterprise Linux WS version 4 (cpe:/o:redhat:enterprise_linux:4::ws) - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=src&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=i386&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ia64&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=ppc&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=s390x&epoch=7 (Impact: Low - Fixed: pkg:rpm/redhat/squid-debuginfo@2.5.STABLE6-3.4E.9?arch=x86_64&epoch=7 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as) - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop) - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es) - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws) - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-3e.3?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-3e.3?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux AS version 4 (cpe:/o:redhat:enterprise_linux:4::as) - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux Desktop version 4 (cpe:/o:redhat:enterprise_linux:4::desktop) - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux ES version 4 (cpe:/o:redhat:enterprise_linux:4::es) - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-1999-1572 Discovered date: 2005-11-01T00:00:00+00:00 Public date: 1996-07-16T00:00:00+00:00 Summary: security flaw Description: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-1999-1572 - RHBZ#1616458: https://bugzilla.redhat.com/show_bug.cgi?id=1616458 - External: https://www.cve.org/CVERecord?id=CVE-1999-1572 - External: https://nvd.nist.gov/vuln/detail/CVE-1999-1572 Acknowledgments: - Contributor: Mike O'Connor Exploit exists: False Product: Red Hat Enterprise Linux WS version 4 (cpe:/o:redhat:enterprise_linux:4::ws) - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=src (Impact: Low - Fixed: pkg:rpm/redhat/cpio@2.5-7.EL4.1?arch=x86_64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=i386 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ia64 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=ppc (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390 (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=s390x (Impact: Low - Fixed: pkg:rpm/redhat/cpio-debuginfo@2.5-7.EL4.1?arch=x86_64 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-0715 Public date: 2000-08-05T00:00:00+00:00 Summary: security flaw Description: DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-0715 - RHBZ#1616507: https://bugzilla.redhat.com/show_bug.cgi?id=1616507 - External: https://www.cve.org/CVERecord?id=CVE-2000-0715 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-0715 Exploit exists: False Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-0715 Public date: 2000-08-05T00:00:00+00:00 Summary: security flaw Description: DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-0715 - RHBZ#1616507: https://bugzilla.redhat.com/show_bug.cgi?id=1616507 - External: https://www.cve.org/CVERecord?id=CVE-2000-0715 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-0715 Exploit exists: False Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1134 Public date: 2000-10-28T00:00:00+00:00 Summary: security flaw Description: Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.... Statement: This issue was fixed in the following products: - Red Hat Linux 5.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 5.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.0 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.1 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.1 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 6.2 - RHSA-2000:117 (2000-11-27) - Red Hat Linux 6.2 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0 - RHSA-2000:121 (2000-11-30) - Red Hat Linux 7.0j - RHSA-2000:121 (2000-11-30) References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1134 - RHBZ#1616537: https://bugzilla.redhat.com/show_bug.cgi?id=1616537 - External: https://www.cve.org/CVERecord?id=CVE-2000-1134 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1134 Exploit exists: False Product: Red Hat Linux 7.0j (cpe:/o:redhat:linux:7.0j) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1137 Public date: 2000-11-29T00:00:00+00:00 Summary: security flaw Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137 - RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538 - External: https://www.cve.org/CVERecord?id=CVE-2000-1137 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1137 Public date: 2000-11-29T00:00:00+00:00 Summary: security flaw Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137 - RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538 - External: https://www.cve.org/CVERecord?id=CVE-2000-1137 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137 Exploit exists: False Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1137 Public date: 2000-11-29T00:00:00+00:00 Summary: security flaw Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137 - RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538 - External: https://www.cve.org/CVERecord?id=CVE-2000-1137 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137 Exploit exists: False Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1137 Public date: 2000-11-29T00:00:00+00:00 Summary: security flaw Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137 - RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538 - External: https://www.cve.org/CVERecord?id=CVE-2000-1137 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1137 Public date: 2000-11-29T00:00:00+00:00 Summary: security flaw Description: GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Statement: Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch. References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1137 - RHBZ#1616538: https://bugzilla.redhat.com/show_bug.cgi?id=1616538 - External: https://www.cve.org/CVERecord?id=CVE-2000-1137 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1137 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1191 Discovered date: 2006-12-06T00:00:00+00:00 Public date: 2000-04-18T00:00:00+00:00 Summary: security flaw Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191 - RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546 - External: https://www.cve.org/CVERecord?id=CVE-2000-1191 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191 Exploit exists: False Product: Red Hat Enterprise Linux AS version 3 (cpe:/o:redhat:enterprise_linux:3::as) - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1191 Discovered date: 2006-12-06T00:00:00+00:00 Public date: 2000-04-18T00:00:00+00:00 Summary: security flaw Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191 - RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546 - External: https://www.cve.org/CVERecord?id=CVE-2000-1191 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191 Exploit exists: False Product: Red Hat Desktop version 3 (cpe:/o:redhat:enterprise_linux:3::desktop) - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1191 Discovered date: 2006-12-06T00:00:00+00:00 Public date: 2000-04-18T00:00:00+00:00 Summary: security flaw Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191 - RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546 - External: https://www.cve.org/CVERecord?id=CVE-2000-1191 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191 Exploit exists: False Product: Red Hat Enterprise Linux ES version 3 (cpe:/o:redhat:enterprise_linux:3::es) - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1191 Discovered date: 2006-12-06T00:00:00+00:00 Public date: 2000-04-18T00:00:00+00:00 Summary: security flaw Description: htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1191 - RHBZ#1616546: https://bugzilla.redhat.com/show_bug.cgi?id=1616546 - External: https://www.cve.org/CVERecord?id=CVE-2000-1191 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1191 Exploit exists: False Product: Red Hat Enterprise Linux WS version 3 (cpe:/o:redhat:enterprise_linux:3::ws) - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=src&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=i386&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ia64&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=ppc&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=s390x&epoch=2 (Impact: Low - Fixed: pkg:rpm/redhat/htdig-debuginfo@3.1.6-7.el3?arch=x86_64&epoch=2 (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1211 Public date: 2000-12-22T00:00:00+00:00 Summary: security flaw Description: Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1211 - RHBZ#1616549: https://bugzilla.redhat.com/show_bug.cgi?id=1616549 - External: https://www.cve.org/CVERecord?id=CVE-2000-1211 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1211 Exploit exists: False Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1211 Public date: 2000-12-22T00:00:00+00:00 Summary: security flaw Description: Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1211 - RHBZ#1616549: https://bugzilla.redhat.com/show_bug.cgi?id=1616549 - External: https://www.cve.org/CVERecord?id=CVE-2000-1211 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1211 Exploit exists: False Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1212 Public date: 2000-12-18T00:00:00+00:00 Summary: security flaw Description: Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1212 - RHBZ#1616550: https://bugzilla.redhat.com/show_bug.cgi?id=1616550 - External: https://www.cve.org/CVERecord?id=CVE-2000-1212 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1212 Exploit exists: False Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1212 Public date: 2000-12-18T00:00:00+00:00 Summary: security flaw Description: Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1212 - RHBZ#1616550: https://bugzilla.redhat.com/show_bug.cgi?id=1616550 - External: https://www.cve.org/CVERecord?id=CVE-2000-1212 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1212 Exploit exists: False Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl097a?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) - Not Affected: pkg:rpm/redhat/openssl098e?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat JBoss Enterprise Application Platform 6 (cpe:/a:redhat:jboss_enterprise_application_platform:6) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat JBoss Enterprise Web Server 1 (cpe:/a:redhat:jboss_enterprise_web_server:1) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2000-1254 Discovered date: 2016-05-04T00:00:00+00:00 Public date: 2000-06-01T00:00:00+00:00 Summary: openssl: Mishandling C bitwise-shift operations making easier to bypass protection mechanisms Description: crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2000-1254 - RHBZ#1333287: https://bugzilla.redhat.com/show_bug.cgi?id=1333287 - External: https://www.cve.org/CVERecord?id=CVE-2000-1254 - External: https://nvd.nist.gov/vuln/detail/CVE-2000-1254 Exploit exists: False Product: Red Hat JBoss Enterprise Web Server 3 (cpe:/a:redhat:jboss_enterprise_web_server:3) - Not Affected: pkg:rpm/redhat/openssl?arch=src (Impact: Moderate, CVSS: CVSSv2.0: 4.3 / AV:N/AC:M/Au:N/C:P/I:N/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0010 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010 - RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555 - External: https://www.cve.org/CVERecord?id=CVE-2001-0010 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0010 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010 - RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555 - External: https://www.cve.org/CVERecord?id=CVE-2001-0010 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0010 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0010 - RHBZ#1616555: https://bugzilla.redhat.com/show_bug.cgi?id=1616555 - External: https://www.cve.org/CVERecord?id=CVE-2001-0010 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0010 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0012 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012 - RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557 - External: https://www.cve.org/CVERecord?id=CVE-2001-0012 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0012 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012 - RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557 - External: https://www.cve.org/CVERecord?id=CVE-2001-0012 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0012 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0012 - RHBZ#1616557: https://bugzilla.redhat.com/show_bug.cgi?id=1616557 - External: https://www.cve.org/CVERecord?id=CVE-2001-0012 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0012 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0011 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011 - RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556 - External: https://www.cve.org/CVERecord?id=CVE-2001-0011 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0011 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011 - RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556 - External: https://www.cve.org/CVERecord?id=CVE-2001-0011 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0011 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0011 - RHBZ#1616556: https://bugzilla.redhat.com/show_bug.cgi?id=1616556 - External: https://www.cve.org/CVERecord?id=CVE-2001-0011 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0011 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0013 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013 - RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558 - External: https://www.cve.org/CVERecord?id=CVE-2001-0013 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0013 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013 - RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558 - External: https://www.cve.org/CVERecord?id=CVE-2001-0013 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0013 Public date: 2001-01-29T00:00:00+00:00 Summary: security flaw Description: Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0013 - RHBZ#1616558: https://bugzilla.redhat.com/show_bug.cgi?id=1616558 - External: https://www.cve.org/CVERecord?id=CVE-2001-0013 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0013 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0036 Public date: 2000-12-08T00:00:00+00:00 Summary: security flaw Description: KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0036 - RHBZ#1616560: https://bugzilla.redhat.com/show_bug.cgi?id=1616560 - External: https://www.cve.org/CVERecord?id=CVE-2001-0036 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0036 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0036 Public date: 2000-12-08T00:00:00+00:00 Summary: security flaw Description: KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0036 - RHBZ#1616560: https://bugzilla.redhat.com/show_bug.cgi?id=1616560 - External: https://www.cve.org/CVERecord?id=CVE-2001-0036 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0036 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0060 Public date: 2000-12-18T00:00:00+00:00 Summary: security flaw Description: Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0060 - RHBZ#1616562: https://bugzilla.redhat.com/show_bug.cgi?id=1616562 - External: https://www.cve.org/CVERecord?id=CVE-2001-0060 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0060 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0066 Public date: 2000-11-26T00:00:00+00:00 Summary: security flaw Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066 - RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563 - External: https://www.cve.org/CVERecord?id=CVE-2001-0066 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066 Exploit exists: False Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0066 Public date: 2000-11-26T00:00:00+00:00 Summary: security flaw Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066 - RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563 - External: https://www.cve.org/CVERecord?id=CVE-2001-0066 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066 Exploit exists: False Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0066 Public date: 2000-11-26T00:00:00+00:00 Summary: security flaw Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066 - RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563 - External: https://www.cve.org/CVERecord?id=CVE-2001-0066 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0066 Public date: 2000-11-26T00:00:00+00:00 Summary: security flaw Description: Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0066 - RHBZ#1616563: https://bugzilla.redhat.com/show_bug.cgi?id=1616563 - External: https://www.cve.org/CVERecord?id=CVE-2001-0066 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0066 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0071 Public date: 2000-12-19T00:00:00+00:00 Summary: security flaw Description: gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0071 - RHBZ#1616564: https://bugzilla.redhat.com/show_bug.cgi?id=1616564 - External: https://www.cve.org/CVERecord?id=CVE-2001-0071 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0071 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0071 Public date: 2000-12-19T00:00:00+00:00 Summary: security flaw Description: gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0071 - RHBZ#1616564: https://bugzilla.redhat.com/show_bug.cgi?id=1616564 - External: https://www.cve.org/CVERecord?id=CVE-2001-0071 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0071 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0072 Public date: 2000-12-19T00:00:00+00:00 Summary: security flaw Description: gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0072 - RHBZ#1616565: https://bugzilla.redhat.com/show_bug.cgi?id=1616565 - External: https://www.cve.org/CVERecord?id=CVE-2001-0072 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0072 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0072 Public date: 2000-12-19T00:00:00+00:00 Summary: security flaw Description: gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0072 - RHBZ#1616565: https://bugzilla.redhat.com/show_bug.cgi?id=1616565 - External: https://www.cve.org/CVERecord?id=CVE-2001-0072 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0072 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0108 Public date: 2001-01-12T00:00:00+00:00 Summary: security flaw Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108 - RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567 - External: https://www.cve.org/CVERecord?id=CVE-2001-0108 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0108 Public date: 2001-01-12T00:00:00+00:00 Summary: security flaw Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108 - RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567 - External: https://www.cve.org/CVERecord?id=CVE-2001-0108 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108 Exploit exists: False Product: Red Hat Linux 6.0 (cpe:/o:redhat:linux:6.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0108 Public date: 2001-01-12T00:00:00+00:00 Summary: security flaw Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108 - RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567 - External: https://www.cve.org/CVERecord?id=CVE-2001-0108 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108 Exploit exists: False Product: Red Hat Linux 6.1 (cpe:/o:redhat:linux:6.1) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0108 Public date: 2001-01-12T00:00:00+00:00 Summary: security flaw Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108 - RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567 - External: https://www.cve.org/CVERecord?id=CVE-2001-0108 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0108 Public date: 2001-01-12T00:00:00+00:00 Summary: security flaw Description: PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0108 - RHBZ#1616567: https://bugzilla.redhat.com/show_bug.cgi?id=1616567 - External: https://www.cve.org/CVERecord?id=CVE-2001-0108 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0108 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0117 Public date: 2001-01-10T00:00:00+00:00 Summary: security flaw Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117 - RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568 - External: https://www.cve.org/CVERecord?id=CVE-2001-0117 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0117 Public date: 2001-01-10T00:00:00+00:00 Summary: security flaw Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117 - RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568 - External: https://www.cve.org/CVERecord?id=CVE-2001-0117 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117 Exploit exists: False Product: Red Hat Linux 6.2 (cpe:/o:redhat:linux:6.2) - Fixed: N/A (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0117 Public date: 2001-01-10T00:00:00+00:00 Summary: security flaw Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117 - RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568 - External: https://www.cve.org/CVERecord?id=CVE-2001-0117 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117 Exploit exists: False Product: Red Hat Linux 7.0 (cpe:/o:redhat:linux:7.0) - Fixed: N/A (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0117 Public date: 2001-01-10T00:00:00+00:00 Summary: security flaw Description: sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0117 - RHBZ#1616568: https://bugzilla.redhat.com/show_bug.cgi?id=1616568 - External: https://www.cve.org/CVERecord?id=CVE-2001-0117 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0117 Exploit exists: False Product: Red Hat Linux 7.1 (cpe:/o:redhat:linux:7.1) - Fixed: N/A (Impact: Low END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0128 Public date: 2000-12-16T00:00:00+00:00 Summary: security flaw Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128 - RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569 - External: https://www.cve.org/CVERecord?id=CVE-2001-0128 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128 Exploit exists: False Product: Red Hat Powertools 6.1 (cpe:/a:redhat:powertools:6.1) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0128 Public date: 2000-12-16T00:00:00+00:00 Summary: security flaw Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128 - RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569 - External: https://www.cve.org/CVERecord?id=CVE-2001-0128 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128 Exploit exists: False Product: Red Hat Powertools 6.2 (cpe:/a:redhat:powertools:6.2) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0128 Public date: 2000-12-16T00:00:00+00:00 Summary: security flaw Description: Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0128 - RHBZ#1616569: https://bugzilla.redhat.com/show_bug.cgi?id=1616569 - External: https://www.cve.org/CVERecord?id=CVE-2001-0128 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0128 Exploit exists: False Product: Red Hat Powertools 7.0 (cpe:/a:redhat:powertools:7.0) - Fixed: N/A (Impact: None END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat Enterprise Linux 5 (cpe:/o:redhat:enterprise_linux:5) - Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat Enterprise Linux 6 (cpe:/o:redhat:enterprise_linux:6) - Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat Enterprise Linux 7 (cpe:/o:redhat:enterprise_linux:7) - Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat Enterprise Linux 8 (cpe:/o:redhat:enterprise_linux:8) - Not Affected: pkg:rpm/redhat/httpd@2.4?arch=src&rpmmod=httpd:2.4 (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat JBoss Core Services (cpe:/a:redhat:jboss_core_services:1) - Not Affected: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat JBoss Enterprise Web Server 2 (cpe:/a:redhat:jboss_enterprise_web_server:2) - Affected / Out of support scope: pkg:rpm/redhat/httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) - Affected / Out of support scope: N/A (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0131 Discovered date: 2020-10-09T00:00:00+00:00 Public date: 2001-01-10T00:00:00+00:00 Summary: httpd: allows local users to overwrite arbitrary files via a symlink attack Description: A flaw was found in Apache httpd. Both htpasswd and htdigest allow local users to overwrite arbitrary files via a symlink attack. The highest threat from this vulnerability is to data integrity.... Statement: All versions of httpd package shipped with Red Hat Products, uses APR's safe temp file creation and therefore they are not affected by this flaw References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0131 - RHBZ#1886967: https://bugzilla.redhat.com/show_bug.cgi?id=1886967 - External: https://www.cve.org/CVERecord?id=CVE-2001-0131 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0131 CWE: CWE-59 (Improper Link Resolution Before File Access ('Link Following')) Exploit exists: False Product: Red Hat Software Collections (cpe:/a:redhat:rhel_software_collections:3) - Not Affected: pkg:rpm/redhat/httpd24-httpd?arch=src (Impact: Low, CVSS: CVSSv3.1: 2.9 / AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) END_VULNERABILITY
BEGIN_VULNERABILITY CVE ID: CVE-2001-0141 Public date: 2001-01-10T00:00:00+00:00 Summary: security flaw Description: mgetty 1.1.22 allows local users to overwrite arbitrary files via a symlink attack in some configurations.... References: - Canonical URL: https://access.redhat.com/security/cve/CVE-2001-0141 - RHBZ#1616570: https://bugzilla.redhat.com/show_bug.cgi?id=1616570 - External: https://www.cve.org/CVERecord?id=CVE-2001-0141 - External: https://nvd.nist.gov/vuln/detail/CVE-2001-0141 Exploit exists: False Product: Red Hat Linux 5.2 (cpe:/o:redhat:linux:5.2) - Fixed: N/A (Impact: None END_VULNERABILITY