CVE-2005-0403
https://notcve.org/view.php?id=CVE-2005-0403
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure. • http://www.redhat.com/support/errata/RHSA-2005-293.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435 https://access.redhat.com/security/cve/CVE-2005-0403 https://bugzilla.redhat.com/show_bug.cgi?id=1617522 •
CVE-2005-1268
https://notcve.org/view.php?id=CVE-2005-1268
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte. Error de fuera-por-uno en la retrollamda de verificación de Lista de Revocación de Certificados (CRL) de mod_ssl para Apache, cuando se configura para usar un CRL, permite a atacantes remotos causar una denegación de servicio (caída de proceso hijo) mediante una CRL que causa un desbordamiento de búfer de un byte nule. • http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html http://rhn.redhat.com/errata/RHSA-2005-582.html http://secunia.com/advisories/19072 http://secunia.com/advisories/19185 http://securityreason.com/securityalert/604 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1 http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm http://www.debian.org/security/2005/dsa-805 http://www.mandriva.com/security/advisories?name=MDKSA-2005:129 http:/& • CWE-193: Off-by-one Error •
CVE-2005-1760
https://notcve.org/view.php?id=CVE-2005-1760
sysreport 1.3.15 and earlier includes contents of the up2date file in a report, which leaks the password for a proxy server in plaintext and allows local users to gain privileges. • http://secunia.com/advisories/15675 http://securitytracker.com/id?1014181 http://www.redhat.com/support/errata/RHSA-2005-502.html http://www.securityfocus.com/bid/13936 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A623 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9522 https://access.redhat.com/security/cve/CVE-2005-1760 https://bugzilla.redhat.com/show_bug.cgi?id=1617664 •
CVE-2005-1267 – Tcpdump - bgp_update_print Remote Denial of Service
https://notcve.org/view.php?id=CVE-2005-1267
The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet. • https://www.exploit-db.com/exploits/1037 http://secunia.com/advisories/15634 http://secunia.com/advisories/17118 http://www.debian.org/security/2005/dsa-854 http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html http://www.redhat.com/support/errata/RHSA-2005-505.html http://www.securityfocus.com/archive/1/430292/100/0/threaded http://www.securityfocus.com/bid/13906 http://www.trustix.org/errata/2005/0028 https://bugzilla.redhat.com/bugzilla/show& •
CVE-2005-0757
https://notcve.org/view.php?id=CVE-2005-0757
The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled. • http://secunia.com/advisories/18056 http://secunia.com/advisories/18059 http://www.debian.org/security/2005/dsa-921 http://www.debian.org/security/2005/dsa-922 http://www.redhat.com/support/errata/RHSA-2005-294.html http://www.securityfocus.com/bid/13680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11406 https://access.redhat.com/security/cve/CVE-2005-0757 https://bugzilla.redhat.com/show_bug.cgi?id=1617572 •