Search Results (Refine Search)
- CPE Product Version: cpe:/o:redhat:enterprise_linux:2.1::es
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2008-1447 |
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." Published: July 08, 2008; 7:41:00 PM -0400 |
V3.1: 6.8 MEDIUM V2.0: 5.0 MEDIUM |
CVE-2008-1767 |
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps. Published: May 23, 2008; 11:32:00 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2008-1419 |
Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow. Published: May 16, 2008; 8:54:00 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2008-1420 |
Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow. Published: May 16, 2008; 8:54:00 AM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
CVE-2008-1423 |
Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow. Published: May 16, 2008; 8:54:00 AM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
CVE-2007-5365 |
Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU. Published: October 11, 2007; 6:17:00 AM -0400 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2007-4137 |
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable. Published: September 18, 2007; 3:17:00 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |