RSS   Podatności dla 'Linux'   RSS

2014-02-05
 
CVE-2011-4613

CWE-264
 

 
The X.Org X wrapper (xserver-wrapper.c) in Debian GNU/Linux and Ubuntu Linux does not properly verify the TTY of a user who is starting X, which allows local users to bypass intended access restrictions by associating stdin with a file that is misinterpreted as the console TTY.

 
2009-05-11
 
CVE-2009-1601

CWE-264
 

 
The Ubuntu clamav-milter.init script in clamav-milter before 0.95.1+dfsg-1ubuntu1.2 in Ubuntu 9.04 sets the ownership of the current working directory to the clamav account, which might allow local users to bypass intended access restrictions via read or write operations involving this directory.

 
2009-05-06
 
CVE-2009-1573

CWE-264
 

 
xvfb-run 1.6.1 in Debian GNU/Linux, Ubuntu, Fedora 10, and possibly other operating systems place the magic cookie (MCOOKIE) on the command line, which allows local users to gain privileges by listing the process and its arguments.

 
2009-05-07
 
CVE-2008-6792

 

 
system-tools-backends before 2.6.0-1ubuntu1.1 in Ubuntu 8.10, as used by "Users and Groups" in GNOME System Tools, hashes account passwords with 3DES and consequently limits effective password lengths to eight characters, which makes it easier for context-dependent attackers to successfully conduct brute-force password attacks.

 
2008-11-04
 
CVE-2008-4306

CWE-noinfo
 

 
Buffer overflow in enscript before 1.6.4 has unknown impact and attack vectors, possibly related to the font escape sequence.

 
2008-05-18
 
CVE-2008-2285

CWE-310
 

 
The ssh-vulnkey tool on Ubuntu Linux 7.04, 7.10, and 8.04 LTS does not recognize authorized_keys lines that contain options, which makes it easier for remote attackers to exploit CVE-2008-0166 by guessing a key that was not identified by this tool.

 

 >>> Vendor: Ubuntu 14 Produkty
Linux
Linux kernel
Ubuntu linux
Apparmor
Ubuntu
73-oubuntu
Live dvd
Edubuntu
Language-selector
Ubiquity-slideshow-ubuntu
Metal as a service
Upstart
Vivid
Network-manager


Copyright 2024, cxsecurity.com

 

Back to Top