cve
stringlengths
13
16
affected_component
stringlengths
0
177
summary
stringlengths
0
227
severity
stringclasses
5 values
cvss_v2
stringclasses
244 values
cvss_v3
stringlengths
37
48
description
stringlengths
30
4k
statement
stringlengths
31
2.49k
release_date
stringlengths
25
25
fixed_products
sequencelengths
0
28.2k
known_affected_products
sequencelengths
0
597
known_not_affected_products
sequencelengths
0
30k
under_investigation_products
sequencelengths
0
77
threat_categories
sequencelengths
0
4
threat_details
sequencelengths
0
4
threat_dates
sequencelengths
0
4
remediation_categories
sequencelengths
0
215
remediation_details
sequencelengths
0
215
remediation_dates
sequencelengths
0
215
CVE-2001-1413
security flaw
Moderate
null
null
Stack-based buffer overflow in the comprexx function for ncompress 4.2.4 and earlier, when used in situations that cross security boundaries (such as FTP server), may allow remote attackers to execute arbitrary code via a long filename argument.
null
2025-01-08T20:26:54+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/" ]
[ "2004-12-13T19:31:00+00:00" ]
CVE-2001-1556
httpd
log files contain information directly supplied by clients and does not filter or quote control characters
Low
null
3.4/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
2025-01-09T05:24:08+00:00
[]
[]
[ "red_hat_enterprise_linux_5:httpd", "red_hat_enterprise_linux_6:httpd", "red_hat_enterprise_linux_7:httpd", "red_hat_enterprise_linux_8:httpd:2.4/httpd", "red_hat_jboss_core_services:httpd", "red_hat_jboss_enterprise_web_server_2:httpd", "red_hat_jboss_enterprise_web_server_2:httpd22", "red_hat_software_collections:httpd24-httpd" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1385
security flaw
None
null
null
The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.
null
2025-01-08T20:25:22+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart" ]
[ "2000-12-20T00:00:00+00:00" ]
CVE-2001-0890
security flaw
None
null
null
Certain backend drivers in the SANE library 1.0.3 and earlier, as used in frontend software such as XSane, allows local users to modify files via a symlink attack on temporary files.
null
2025-01-08T20:27:42+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.0", "Red Hat Powertools 6.1", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T12:49:00+00:00", "2002-01-08T12:48:00+00:00" ]
CVE-2001-1002
security flaw
None
null
null
The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.
null
2025-01-08T20:23:31+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.0j", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find RHN to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will ultimately upgrade the\nappropriate RPMs on your system." ]
[ "2001-10-30T11:23:00+00:00" ]
CVE-2001-1147
security flaw
Important
null
null
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
null
2025-01-08T20:24:07+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-16T19:15:00+00:00" ]
CVE-2001-0886
security flaw
None
null
null
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
null
2025-01-08T20:24:26+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-14T21:36:00+00:00" ]
CVE-2001-0869
security flaw
None
null
null
Format string vulnerability in the default logging callback function _sasl_syslog in common.c in Cyrus SASL library (cyrus-sasl) may allow remote attackers to execute arbitrary commands.
null
2025-01-08T20:27:54+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-29T18:51:00+00:00", "2001-11-29T18:55:00+00:00" ]
CVE-2001-1405
security flaw
None
null
null
Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi.
null
2025-01-08T20:25:46+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1393
security flaw
None
null
null
Unknown vulnerability in classifier code for Linux kernel before 2.2.19 could result in denial of service (hang).
null
2025-01-08T20:26:18+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1392
security flaw
None
null
null
The Linux kernel before 2.2.19 does not have unregister calls for (1) CPUID and (2) MSR drivers, which could cause a DoS (crash) by unloading and reloading the drivers.
null
2025-01-08T20:23:20+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1404
security flaw
None
null
null
Bugzilla before 2.14 stores user passwords in plaintext and sends password requests in an email message, which could allow attackers to gain privileges.
null
2025-01-08T20:28:42+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0887
security flaw
None
null
null
xSANE 0.81 and earlier allows local users to modify files of other xSANE users via a symlink attack on temporary files.
null
2025-01-08T20:24:04+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Powertools 6.0", "Red Hat Powertools 6.1", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T12:49:00+00:00", "2002-01-08T12:48:00+00:00" ]
CVE-2001-1279
security flaw
None
null
null
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
null
2025-01-08T20:26:08+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-09T18:30:00+00:00" ]
CVE-2001-1384
security flaw
Important
null
null
ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
null
2025-01-08T20:28:42+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-10-18T22:31:00+00:00", "2001-10-23T07:44:00+00:00" ]
CVE-2001-0653
security flaw
None
null
null
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
null
2025-01-08T20:29:28+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-13T20:25:00+00:00" ]
CVE-2001-0852
security flaw
Important
null
null
TUX HTTP server 2.1.0-2 in Red Hat Linux allows remote attackers to cause a denial of service via a long Host: header.
null
2025-01-08T20:33:40+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-11-02T20:08:00+00:00" ]
CVE-2001-0556
security flaw
None
null
null
The Nirvana Editor (NEdit) 5.1.1 and earlier allows a local attacker to overwrite other users' files via a symlink attack on (1) backup files or (2) temporary files used when nedit prints a file or portions of a file.
null
2025-01-08T20:31:46+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-08T14:04:00+00:00" ]
CVE-2001-0690
security flaw
None
null
null
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
null
2025-01-08T20:31:00+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-26T19:22:00+00:00" ]
CVE-2001-1351
security flaw
None
null
null
Cross-site scripting vulnerability in Namazu 2.0.8 and earlier allows remote attackers to execute arbitrary Javascript as other web users via the index file name that is displayed when displaying hit numbers.
null
2025-01-08T20:24:54+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0405
security flaw
Important
null
null
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
null
2025-01-08T20:33:38+00:00
[ "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-22T21:12:00+00:00" ]
CVE-2001-0560
security flaw
None
null
null
Buffer overflow in Vixie cron 3.0.1-56 and earlier could allow a local attacker to gain additional privileges via a long username (> 20 characters).
null
2025-01-08T20:33:14+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-12T00:00:00+00:00" ]
CVE-2001-1275
security flaw
None
null
null
MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking.
null
2025-01-08T20:25:00+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Uvh mysql*\n\nNote that in rare cases, the shutdown of the old database fails after\nupgrade - to ensure a smooth upgrade, shut the database down before\nupgrading:\n\nservice mysqld stop" ]
[ "2001-01-18T00:00:00+00:00" ]
CVE-2001-0872
security flaw
None
null
null
OpenSSH 3.0.1 and earlier with UseLogin enabled does not properly cleanse critical environment variables such as LD_PRELOAD, which allows local users to gain root privileges.
null
2025-01-08T20:24:14+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-05T01:13:00+00:00" ]
CVE-2001-1388
security flaw
None
null
null
iptables before 1.2.4 does not accurately convert rate limits that are specified on the command line, which could allow attackers or users to generate more or less traffic than intended by the administrator.
null
2025-01-08T20:28:23+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-07T14:10:00+00:00" ]
CVE-2001-0825
security flaw
None
null
null
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
null
2025-01-08T20:30:36+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-06T19:13:00+00:00" ]
CVE-2001-0736
security flaw
None
null
null
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
null
2025-01-08T20:30:14+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-31T00:00:00+00:00" ]
CVE-2001-1333
security flaw
None
null
null
Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files.
null
2025-01-08T20:28:48+00:00
[ "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-15T12:36:00+00:00" ]
CVE-2001-0522
security flaw
None
null
null
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file.
null
2025-01-08T20:32:52+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T19:53:00+00:00" ]
CVE-2001-1276
security flaw
None
null
null
ispell before 3.1.20 allows local users to overwrite files of other users via a symlink attack on a temporary file.
null
2025-01-08T20:26:04+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-10T22:27:00+00:00" ]
CVE-2001-0060
security flaw
None
null
null
Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username.
null
2025-01-08T20:30:04+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-0670
security flaw
None
null
null
Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue.
null
2025-01-08T20:29:20+00:00
[ "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-02T20:48:00+00:00" ]
CVE-2001-1391
security flaw
None
null
null
Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory.
null
2025-01-08T20:24:03+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1407
security flaw
None
null
null
Bugzilla before 2.14 allows Bugzilla users to bypass group security checks by marking a bug as the duplicate of a restricted bug, which adds the user to the CC list of the restricted bug and allows the user to view the bug.
null
2025-01-08T20:26:51+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0884
security flaw
None
null
null
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
null
2025-01-08T20:24:43+00:00
[ "Red Hat Linux 7.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1", "Red Hat Secure Web Server 3.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe] desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-12-21T14:06:00+00:00", "2001-12-21T14:10:00+00:00", "2002-01-02T15:23:00+00:00" ]
CVE-2001-0191
security flaw
None
null
null
gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
null
2025-01-08T20:33:22+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix", "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-02T00:00:00+00:00", "2001-02-02T00:00:00+00:00" ]
CVE-2001-0596
security flaw
None
null
null
Netscape Communicator before 4.77 allows remote attackers to execute arbitrary Javascript via a GIF image whose comment contains the Javascript.
null
2025-01-08T20:30:28+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-09T00:00:00+00:00" ]
CVE-2001-1387
security flaw
None
null
null
iptables-save in iptables before 1.2.4 records the "--reject-with icmp-host-prohibited" rule as "--reject-with tcp-reset," which causes iptables to generate different responses than specified by the administrator, possibly leading to an information leak.
null
2025-01-08T20:29:06+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-07T14:10:00+00:00" ]
CVE-2001-0851
security flaw
Important
null
null
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
null
2025-01-08T20:32:54+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2001-11-02T20:08:00+00:00" ]
CVE-2001-0406
security flaw
None
null
null
Samba before 2.2.0 allows local attackers to overwrite arbitrary files via a symlink attack using (1) a printer queue query, (2) the more command in smbclient, or (3) the mput command in smbclient.
null
2025-01-08T20:30:50+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAgain, note that the packages for Red Hat Linux 6.2 requre an updated\nlogrotate package." ]
[ "2001-05-15T02:21:00+00:00" ]
CVE-2001-1352
security flaw
None
null
null
Cross-site scripting vulnerability in Namazu 2.0.9 and earlier allows remote attackers to execute arbitrary Javascript as other web users via an error message that is returned when an invalid index file is specified in the idxname parameter.
null
2025-01-08T20:28:18+00:00
[ "Red Hat Linux 7.0j" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-07-09T12:40:00+00:00" ]
CVE-2001-0328
kernel
TCP connection ISN hijacks
Low
2.6/AV:N/AC:H/Au:N/C:N/I:P/A:N
null
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
This issue did NOT affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
2025-01-08T05:24:01+00:00
[]
[]
[ "red_hat_enterprise_linux_5:kernel", "red_hat_enterprise_linux_6:kernel", "red_hat_enterprise_mrg_2:kernel-rt" ]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[]
[]
[]
CVE-2001-1353
security flaw
None
null
null
ghostscript before 6.51 allows local users to read and write arbitrary files as the 'lp' user via the file operator, even with -dSAFER enabled.
null
2025-01-08T20:27:04+00:00
[ "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nAfter updating the rpms, you will need to restart your print server, by\nrunning:\n\n/sbin/service lpd restart\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-31T22:59:00+00:00" ]
CVE-2001-1083
security flaw
None
null
null
Icecast 1.3.7, and other versions before 1.3.11 with HTTP server file streaming support enabled allows remote attackers to cause a denial of service (crash) via a URL that ends in . (dot), / (forward slash), or \ (backward slash).
null
2025-01-08T20:24:38+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0554
security flaw
Critical
null
null
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
null
2025-01-08T20:31:18+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-08-09T22:14:00+00:00" ]
CVE-2001-0128
security flaw
None
null
null
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
null
2025-01-08T20:32:31+00:00
[ "Red Hat Powertools 6.1", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM.\n\nAfter you have applied the update, restart Zope." ]
[ "2000-12-18T00:00:00+00:00" ]
CVE-2001-0169
security flaw
None
null
null
When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
null
2025-01-08T20:29:28+00:00
[ "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2001-01-15T00:00:00+00:00" ]
CVE-2001-1406
security flaw
None
null
null
process_bug.cgi in Bugzilla before 2.14 does not set the "groupset" bit when a bug is moved between product groups, which will cause the bug to have the old group's restrictions, which might not be as stringent.
null
2025-01-08T20:25:46+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-1390
security flaw
None
null
null
Unknown vulnerability in binfmt_misc in the Linux kernel before 2.2.19, related to user pages.
null
2025-01-08T20:23:26+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-0775
security flaw
Important
null
null
Buffer overflow in xloadimage 4.1 (aka xli 1.16 and 1.17) in Linux allows remote attackers to execute arbitrary code via a FACES format image containing a long (1) Firstname or (2) Lastname field.
null
2025-01-08T20:32:32+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-09T23:39:00+00:00" ]
CVE-2001-1349
security flaw
None
null
null
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
null
2025-01-08T20:27:10+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-13T20:25:00+00:00" ]
CVE-2001-0108
security flaw
None
null
null
PHP Apache module 4.0.4 and earlier allows remote attackers to bypass .htaccess access restrictions via a malformed HTTP request on an unrestricted page that causes PHP to use those access controls on the next page that is requested.
null
2025-01-08T20:29:42+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Because of dependencies, the packages must be installed as a group. No\nupdate for the mod_php package is provided for Red Hat Linux 7; it has been\nmerged into the updated php package.\n\nAfter downloading all RPMs needed for your particular architecture, run:\n\nrpm -Fvh php*\n\nThen restart your web server:\n\n/etc/rc.d/init.d/httpd restart" ]
[ "2000-12-20T00:00:00+00:00" ]
CVE-2001-0763
security flaw
None
null
null
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
null
2025-01-08T20:32:10+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T23:14:00+00:00" ]
CVE-2001-1332
security flaw
None
null
null
Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code.
null
2025-01-08T20:24:54+00:00
[ "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Uvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Note that \nyou can also use wildcards (*.rpm) if your current directory *only*\ncontains the desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-03-15T12:36:00+00:00" ]
CVE-2001-0489
security flaw
None
null
null
Format string vulnerability in gftp prior to 2.0.8 allows remote malicious FTP servers to execute arbitrary commands.
null
2025-01-08T20:32:32+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-04-25T23:27:00+00:00" ]
CVE-2001-0036
security flaw
None
null
null
KTH Kerberos IV allows local users to overwrite arbitrary files via a symlink attack on a ticket file.
null
2025-01-08T20:31:47+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-08T00:00:00+00:00" ]
CVE-2001-0889
security flaw
None
null
null
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.
null
2025-01-08T20:23:02+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-01-08T11:44:00+00:00" ]
CVE-2001-0309
security flaw
None
null
null
inetd in Red Hat 6.2 does not properly close sockets for internal services such as chargen, daytime, echo, etc., which allows remote attackers to cause a denial of service via a series of connections to the internal services.
null
2025-01-08T20:31:24+00:00
[ "Red Hat Linux 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-1378
security flaw
None
null
null
fetchmailconf in fetchmail before 5.7.4 allows local users to overwrite files of other users via a symlink attack on temporary files.
null
2025-01-08T20:25:06+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T15:46:00+00:00" ]
CVE-2001-0569
security flaw
None
null
null
Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.
null
2025-01-08T20:31:46+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-24T00:00:00+00:00" ]
CVE-2001-1397
security flaw
None
null
null
The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory.
null
2025-01-08T20:28:06+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-1401
security flaw
None
null
null
Bugzilla before 2.14 does not properly restrict access to confidential bugs, which could allow Bugzilla users to bypass viewing permissions via modified bug id parameters in (1) process_bug.cgi, (2) show_activity.cgi, (3) showvotes.cgi, (4) showdependencytree.cgi, (5) showdependencygraph.cgi, (6) showattachment.cgi, or (7) describecomponents.cgi.
null
2025-01-08T20:26:47+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-09-10T18:45:00+00:00" ]
CVE-2001-0197
security flaw
None
null
null
Format string vulnerability in print_client in icecast 1.3.8beta2 and earlier allows remote attackers to execute arbitrary commands.
null
2025-01-08T20:31:42+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2001-01-23T00:00:00+00:00" ]
CVE-2001-0894
security flaw
None
null
null
Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
null
2025-01-08T20:26:08+00:00
[ "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-27T23:32:00+00:00" ]
CVE-2001-0441
security flaw
None
null
null
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header.
null
2025-01-08T20:32:28+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-09T00:00:00+00:00" ]
CVE-2001-0011
security flaw
None
null
null
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
null
2025-01-08T20:30:36+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-0787
security flaw
Important
null
null
LPRng in Red Hat Linux 7.0 and 7.1 does not properly drop memberships in supplemental groups when lowering privileges, which could allow a local user to elevate privileges.
null
2025-01-08T20:32:56+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-12T20:23:00+00:00" ]
CVE-2001-0416
security flaw
None
null
null
sgml-tools (aka sgmltools) before 1.0.9-15 creates temporary files with insecure permissions, which allows other users to read files that are being processed by sgml-tools.
null
2025-01-08T20:32:07+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-09T00:00:00+00:00" ]
CVE-2001-0816
security flaw
None
null
null
OpenSSH before 2.9.9, when running sftp using sftp-server and using restricted keypairs, allows remote authenticated users to bypass authorized_keys2 command= restrictions using sftp commands.
null
2025-01-08T20:31:16+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-11-30T17:09:00+00:00" ]
CVE-2001-1246
security flaw
Important
null
null
PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
null
2025-01-08T20:25:56+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[ "impact" ]
[ "Important" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Please Note:\n\nThe /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Please note that the /etc/php.ini configuration file is not replaced or\noverwritten. You should carefully review your configuration file and adapt\nit to your server or service functions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-06-26T00:00:00+00:00", "2002-08-20T15:16:00+00:00" ]
CVE-2001-1374
security flaw
None
null
null
expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.
null
2025-01-08T20:26:30+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-08-12T19:38:00+00:00" ]
CVE-2001-1323
security flaw
Critical
null
null
Buffer overflow in MIT Kerberos 5 (krb5) 1.2.2 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via base-64 encoded data, which is not properly handled when the radix_encode function processes file glob output from the ftpglob function.
null
2025-01-08T20:23:50+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Critical" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-17T01:32:00+00:00" ]
CVE-2001-0066
security flaw
None
null
null
Secure Locate (slocate) allows local users to corrupt memory via a malformed database file that specifies an offset value that accesses memory outside of the intended buffer.
null
2025-01-08T20:29:28+00:00
[ "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-1227
security flaw
Moderate
null
null
Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
null
2025-01-08T20:25:17+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Powertools 6.2", "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter you have updated the packages, you must restart zope:\n\n /etc/rc.d/init.d/zope restart" ]
[ "2001-09-18T08:22:00+00:00", "2001-10-10T22:16:00+00:00" ]
CVE-2001-1030
security flaw
None
null
null
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
null
2025-01-08T20:23:50+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-19T20:30:00+00:00" ]
CVE-2001-1175
security flaw
Moderate
null
null
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
null
2025-01-08T20:23:42+00:00
[ "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAlso note that users of vipw may want to run (as root):\n\nchmod 0400 /etc/shadow\n\nto ensure that the file has the correct permissions.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-16T16:51:00+00:00", "2001-10-16T19:15:00+00:00" ]
CVE-2001-1572
security flaw
Moderate
null
null
The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets.
null
2025-01-08T20:26:26+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ]
[]
[]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[ "vendor_fix" ]
[ "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date." ]
[ "2003-06-19T13:55:00+00:00" ]
CVE-2001-1162
security flaw
None
null
null
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
null
2025-01-08T20:28:56+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-26T19:00:00+00:00" ]
CVE-2001-0289
security flaw
None
null
null
Joe text editor 2.8 searches the current working directory (CWD) for the .joerc configuration file, which could allow local users to gain privileges of other users by placing a Trojan Horse .joerc file into a directory, then waiting for users to execute joe from that directory.
null
2025-01-08T20:30:13+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-28T00:00:00+00:00" ]
CVE-2001-1174
security flaw
None
null
null
Buffer overflow in Elm 2.5.5 and earlier allows remote attackers to execute arbitrary code via a long Message-ID header.
null
2025-01-08T20:23:56+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-16T22:07:00+00:00" ]
CVE-2001-0572
security flaw
None
null
null
The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands.
null
2025-01-08T20:32:32+00:00
[ "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-03-23T00:00:00+00:00" ]
CVE-2001-1322
security flaw
None
null
null
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
null
2025-01-08T20:26:12+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-06-07T23:14:00+00:00" ]
CVE-2001-1267
security flaw
Low
null
null
Directory traversal vulnerability in GNU tar 1.13.19 and earlier allows local users to overwrite arbitrary files during archive extraction via a tar file whose filenames contain a .. (dot dot).
null
2025-01-08T20:23:20+00:00
[ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix", "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is available via Red Hat Network. To use Red\nHat Network, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-10-02T18:44:00+00:00", "2002-09-29T08:40:00+00:00" ]
CVE-2001-1375
security flaw
None
null
null
tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory.
null
2025-01-08T20:25:40+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-08-12T19:38:00+00:00" ]
CVE-2001-1230
security flaw
None
null
null
Buffer overflows in Icecast before 1.3.10 allow remote attackers to cause a denial of service (crash) and execute arbitrary code.
null
2025-01-08T20:23:15+00:00
[ "Red Hat Powertools 7.0", "Red Hat Powertools 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2002-04-25T22:08:00+00:00" ]
CVE-2001-0071
security flaw
None
null
null
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
null
2025-01-08T20:30:02+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-19T00:00:00+00:00" ]
CVE-2001-1494
security flaw
Low
null
null
script command in the util-linux package before 2.11n allows local users to overwrite arbitrary files by setting a hardlink from the typescript log file to any file on the system, then having root execute the script command.
null
2025-01-08T20:27:10+00:00
[ "3AS:losetup-0:2.11y-31.11.i386", "3AS:losetup-0:2.11y-31.11.ia64", "3AS:losetup-0:2.11y-31.11.ppc", "3AS:losetup-0:2.11y-31.11.s390", "3AS:losetup-0:2.11y-31.11.s390x", "3AS:losetup-0:2.11y-31.11.x86_64", "3AS:mount-0:2.11y-31.11.i386", "3AS:mount-0:2.11y-31.11.ia64", "3AS:mount-0:2.11y-31.11.ppc", "3AS:mount-0:2.11y-31.11.s390", "3AS:mount-0:2.11y-31.11.s390x", "3AS:mount-0:2.11y-31.11.x86_64", "3AS:util-linux-0:2.11y-31.11.i386", "3AS:util-linux-0:2.11y-31.11.ia64", "3AS:util-linux-0:2.11y-31.11.ppc", "3AS:util-linux-0:2.11y-31.11.s390", "3AS:util-linux-0:2.11y-31.11.s390x", "3AS:util-linux-0:2.11y-31.11.src", "3AS:util-linux-0:2.11y-31.11.x86_64", "3AS:util-linux-debuginfo-0:2.11y-31.11.i386", "3AS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3AS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390", "3AS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3AS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3Desktop:losetup-0:2.11y-31.11.i386", "3Desktop:losetup-0:2.11y-31.11.ia64", "3Desktop:losetup-0:2.11y-31.11.ppc", "3Desktop:losetup-0:2.11y-31.11.s390", "3Desktop:losetup-0:2.11y-31.11.s390x", "3Desktop:losetup-0:2.11y-31.11.x86_64", "3Desktop:mount-0:2.11y-31.11.i386", "3Desktop:mount-0:2.11y-31.11.ia64", "3Desktop:mount-0:2.11y-31.11.ppc", "3Desktop:mount-0:2.11y-31.11.s390", "3Desktop:mount-0:2.11y-31.11.s390x", "3Desktop:mount-0:2.11y-31.11.x86_64", "3Desktop:util-linux-0:2.11y-31.11.i386", "3Desktop:util-linux-0:2.11y-31.11.ia64", "3Desktop:util-linux-0:2.11y-31.11.ppc", "3Desktop:util-linux-0:2.11y-31.11.s390", "3Desktop:util-linux-0:2.11y-31.11.s390x", "3Desktop:util-linux-0:2.11y-31.11.src", "3Desktop:util-linux-0:2.11y-31.11.x86_64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.i386", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ia64", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.ppc", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.s390x", "3Desktop:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3ES:losetup-0:2.11y-31.11.i386", "3ES:losetup-0:2.11y-31.11.ia64", "3ES:losetup-0:2.11y-31.11.ppc", "3ES:losetup-0:2.11y-31.11.s390", "3ES:losetup-0:2.11y-31.11.s390x", "3ES:losetup-0:2.11y-31.11.x86_64", "3ES:mount-0:2.11y-31.11.i386", "3ES:mount-0:2.11y-31.11.ia64", "3ES:mount-0:2.11y-31.11.ppc", "3ES:mount-0:2.11y-31.11.s390", "3ES:mount-0:2.11y-31.11.s390x", "3ES:mount-0:2.11y-31.11.x86_64", "3ES:util-linux-0:2.11y-31.11.i386", "3ES:util-linux-0:2.11y-31.11.ia64", "3ES:util-linux-0:2.11y-31.11.ppc", "3ES:util-linux-0:2.11y-31.11.s390", "3ES:util-linux-0:2.11y-31.11.s390x", "3ES:util-linux-0:2.11y-31.11.src", "3ES:util-linux-0:2.11y-31.11.x86_64", "3ES:util-linux-debuginfo-0:2.11y-31.11.i386", "3ES:util-linux-debuginfo-0:2.11y-31.11.ia64", "3ES:util-linux-debuginfo-0:2.11y-31.11.ppc", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390", "3ES:util-linux-debuginfo-0:2.11y-31.11.s390x", "3ES:util-linux-debuginfo-0:2.11y-31.11.x86_64", "3WS:losetup-0:2.11y-31.11.i386", "3WS:losetup-0:2.11y-31.11.ia64", "3WS:losetup-0:2.11y-31.11.ppc", "3WS:losetup-0:2.11y-31.11.s390", "3WS:losetup-0:2.11y-31.11.s390x", "3WS:losetup-0:2.11y-31.11.x86_64", "3WS:mount-0:2.11y-31.11.i386", "3WS:mount-0:2.11y-31.11.ia64", "3WS:mount-0:2.11y-31.11.ppc", "3WS:mount-0:2.11y-31.11.s390", "3WS:mount-0:2.11y-31.11.s390x", "3WS:mount-0:2.11y-31.11.x86_64", "3WS:util-linux-0:2.11y-31.11.i386", "3WS:util-linux-0:2.11y-31.11.ia64", "3WS:util-linux-0:2.11y-31.11.ppc", "3WS:util-linux-0:2.11y-31.11.s390", "3WS:util-linux-0:2.11y-31.11.s390x", "3WS:util-linux-0:2.11y-31.11.src", "3WS:util-linux-0:2.11y-31.11.x86_64", "3WS:util-linux-debuginfo-0:2.11y-31.11.i386", "3WS:util-linux-debuginfo-0:2.11y-31.11.ia64", "3WS:util-linux-debuginfo-0:2.11y-31.11.ppc", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390", "3WS:util-linux-debuginfo-0:2.11y-31.11.s390x", "3WS:util-linux-debuginfo-0:2.11y-31.11.x86_64", "4AS:util-linux-0:2.12a-16.EL4.12.i386", "4AS:util-linux-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-0:2.12a-16.EL4.12.s390", "4AS:util-linux-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-0:2.12a-16.EL4.12.src", "4AS:util-linux-0:2.12a-16.EL4.12.x86_64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4AS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-0:2.12a-16.EL4.12.src", "4Desktop:util-linux-0:2.12a-16.EL4.12.x86_64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4Desktop:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-0:2.12a-16.EL4.12.i386", "4ES:util-linux-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-0:2.12a-16.EL4.12.s390", "4ES:util-linux-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-0:2.12a-16.EL4.12.src", "4ES:util-linux-0:2.12a-16.EL4.12.x86_64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4ES:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-0:2.12a-16.EL4.12.i386", "4WS:util-linux-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-0:2.12a-16.EL4.12.s390", "4WS:util-linux-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-0:2.12a-16.EL4.12.src", "4WS:util-linux-0:2.12a-16.EL4.12.x86_64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.i386", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ia64", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.ppc", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.s390x", "4WS:util-linux-debuginfo-0:2.12a-16.EL4.12.x86_64" ]
[]
[]
[]
[ "impact" ]
[ "Low" ]
[ null ]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2005-10-11T15:49:00+00:00" ]
CVE-2001-0905
security flaw
None
null
null
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
null
2025-01-08T20:27:33+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-07-19T04:48:00+00:00" ]
CVE-2001-1247
security flaw
None
null
null
PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.
null
2025-01-08T20:28:56+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nAfter applying these updates you will need to restart your web server if it\nwas running before the update was applied." ]
[ "2002-02-28T17:54:00+00:00" ]
CVE-2001-0381
security flaw
None
null
null
The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key.
null
2025-01-08T20:31:24+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-17T01:32:00+00:00" ]
CVE-2001-0440
security flaw
None
null
null
Buffer overflow in logging functions of licq before 1.0.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands.
null
2025-01-08T20:31:24+00:00
[ "Red Hat Linux 7.0", "Red Hat Powertools 6.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-28T00:00:00+00:00" ]
CVE-2001-0010
security flaw
None
null
null
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges.
null
2025-01-08T20:33:16+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "To update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-01-29T00:00:00+00:00" ]
CVE-2001-1380
security flaw
None
null
null
OpenSSH before 2.9.9, while using keypairs and multiple keys of different types in the ~/.ssh/authorized_keys2 file, may not properly handle the "from" option associated with a key, which could allow remote attackers to login from unauthorized IP addresses.
null
2025-01-08T20:26:04+00:00
[ "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-16T16:25:00+00:00" ]
CVE-2001-1400
security flaw
None
null
null
Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock).
null
2025-01-08T20:27:56+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2001-0641
security flaw
None
null
null
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
null
2025-01-08T20:32:10+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nIn particular, if you are running Red Hat Linux 5.x or 6.x, you need to\ninstall the mktemp errata (RHSA-2001:070) before applying this update.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-05-21T18:38:00+00:00" ]
CVE-2001-1379
security flaw
None
null
null
The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name.
null
2025-01-08T20:23:44+00:00
[ "Red Hat Linux 7.2" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-10-24T14:39:00+00:00" ]
CVE-2001-0568
security flaw
None
null
null
Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.
null
2025-01-08T20:32:30+00:00
[ "Red Hat Powertools 6.2", "Red Hat Powertools 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "*NOTE* This advisory supercedes all other Zope and Zope-Hotfix advisories \nfrom Red Hat, Inc.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh <filenames>\n\nwhere <filenames> is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directly *only* contains \nthe\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system." ]
[ "2001-02-24T00:00:00+00:00" ]
CVE-2001-1396
security flaw
None
null
null
Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact.
null
2025-01-08T20:22:58+00:00
[ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel is documented at:\n \nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade." ]
[ "2001-04-10T00:00:00+00:00" ]
CVE-2000-1254
openssl
Mishandling C bitwise-shift operations making easier to bypass protection mechanisms
Moderate
4.3/AV:N/AC:M/Au:N/C:P/I:N/A:N
null
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
null
2025-01-08T22:34:12+00:00
[]
[]
[ "red_hat_enterprise_linux_5:openssl", "red_hat_enterprise_linux_5:openssl097a", "red_hat_enterprise_linux_6:openssl", "red_hat_enterprise_linux_6:openssl098e", "red_hat_enterprise_linux_7:openssl", "red_hat_enterprise_linux_7:openssl098e", "red_hat_jboss_enterprise_application_platform_6:openssl", "red_hat_jboss_enterprise_web_server_1:openssl", "red_hat_jboss_enterprise_web_server_2:openssl", "red_hat_jboss_enterprise_web_server_3:openssl" ]
[]
[ "impact" ]
[ "Moderate" ]
[ null ]
[]
[]
[]
CVE-2000-1137
security flaw
None
null
null
GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.
Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
2025-01-08T13:35:22+00:00
[ "Red Hat Linux 5.2", "Red Hat Linux 6.0", "Red Hat Linux 6.1", "Red Hat Linux 6.2", "Red Hat Linux 7.0" ]
[]
[]
[]
[]
[]
[]
[ "vendor_fix" ]
[ "For each RPM for your particular architecture, run:\n\nrpm -Fvh [filename]\n\nwhere filename is the name of the RPM." ]
[ "2000-12-06T00:00:00+00:00" ]