Vulnerabilities
Vulnerable Software
Redhat:  >> Linux  >> 8.0  Security Vulnerabilities
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
CVSS Score
3.6
EPSS Score
0.001
Published
2003-03-03
The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.
CVSS Score
7.2
EPSS Score
0.001
Published
2003-02-19
uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.
CVSS Score
7.2
EPSS Score
0.002
Published
2003-02-19
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
CVSS Score
10.0
EPSS Score
0.009
Published
2003-02-19
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
CVSS Score
7.5
EPSS Score
0.124
Published
2002-10-28
Exim 3.22 and earlier, in some configurations, does not properly verify the local part of an address when redirecting the address to a pipe, which could allow remote attackers to execute arbitrary commands via shell metacharacters.
CVSS Score
7.5
EPSS Score
0.01
Published
2001-12-19
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
CVSS Score
7.5
EPSS Score
0.199
Published
2001-09-20
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
CVSS Score
4.6
EPSS Score
0.001
Published
2000-10-20
userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).
CVSS Score
7.2
EPSS Score
0.002
Published
2000-09-30
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
CVSS Score
10.0
EPSS Score
0.004
Published
2000-01-04


Contact Us

Shodan ® - All rights reserved