Trustix Secure Linux 1.1

CPE Details

Trustix Secure Linux 1.1
1.1
2007-08-23
19h16 +00:00
2007-09-14
15h36 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*

Informations

Vendor

trustix

Product

secure_linux

Version

1.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2002-1319 2004-09-01 02h00 +00:00 The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
2.1
CVE-2001-1030 2002-06-25 02h00 +00:00 Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
7.5
CVE-2002-0083 2002-06-25 02h00 +00:00 Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
9.8
Critical
CVE-2001-0117 2001-05-07 02h00 +00:00 sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack.
1.2
CVE-2001-0142 2001-05-07 02h00 +00:00 squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations.
1.2
CVE-2001-0169 2001-05-07 02h00 +00:00 When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib.
2.1
CVE-2000-0844 2001-01-22 04h00 +00:00 Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
10
CVE-2000-0867 2001-01-22 04h00 +00:00 Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
7.2
CVE-2000-0917 2001-01-22 04h00 +00:00 Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
10
CVE-2000-1009 2000-11-29 04h00 +00:00 dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
7.2
CVE-2000-0666 2000-10-13 02h00 +00:00 rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
10
CVE-2000-0791 2000-09-21 02h00 +00:00 Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
4.6