statement

statement::KEY vendorstatements::FKEY cvename organization lastmodified contributor statement
1 1 CVE-1999-0997 Red Hat 2006-09-27 Joshua Bressers Red Hat does not consider CVE-1999-0997 to be a security vulnerability. The wu-ftpd process chroots itself into the target ftp directory and will only run external commands as the user logged into the ftp server. Because the process chroots itself, an attacker needs a valid login with write access to the ftp server, and even then they could only potentially execute commands as themselves.
2 1 CVE-1999-1572 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
3 1 CVE-2000-0572 Razor 2007-02-22 Al Menendez Subsequent releases of Razor address this issue and utilize a more robust encryption mechanism for the Razor password. If you are under maintenance, you have the option of upgrading to a more recent release of Razor at no cost. If you are not under maintenance and want to upgrade then you will need to contact Jennifer Stone at jstone@visible.com. Some additional notes ... - With version 4.1 and above, administrators of Razor may switch and use the local OS authentication instead of Razor?s authentication method. - OS permissions and protections always apply to the artifacts stored in the database. - This notice applies to users that have already logged into the supporting system. This primary means of defense is intact inspite of this particular vulnerability. - The next Razor release (due out in mid-2007) will allow remote UNIX clients to utilize SSH to authenticate the remote user. More information on this release and others may be found on the Visible Systems web site: http://www.visible.com/Products/Razor Please contact Visible Systems Corporation at 1-800-6-VISIBLE if you have additional questions.
4 1 CVE-2000-1137 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
5 1 CVE-2000-1199 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
6 1 CVE-2001-0187 Red Hat 2006-09-27 Joshua Bressers Red Hat Enterprise Linux 2.1 ships with wu-ftp version 2.6.2 which is not vulnerable to this issue.
7 1 CVE-2001-0935 Red Hat 2006-09-27 Joshua Bressers CVE-2001-0935 refers to vulnerabilities found when SUSE did a code audit of the wu-ftpd glob.c file in wu-ftpd 2.6.0. They shared these details with the wu-ftpd upstream authors who clarified that some of the issues did not apply, and all were addressed by the version of glob.c in upstream wu-ftpd 2.6.1. Therefore we believe that the issues labelled as CVE-2001-0935 do not affect wu-ftpd 2.6.1 or later versions and therefore do not affect Red Hat Enterprise Linux 2.1.
8 1 CVE-2001-1507 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of OpenSSH as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
9 1 CVE-2001-1534 Red Hat 2006-08-30 Mark J Cox This is not a security issue. The mod_usertrack cookies are not designed to be used for authentication.
10 1 CVE-2001-1556 Red Hat 2006-08-30 Mark J Cox This is a duplicate CVE name and is a combination of CVE-2003-0020 and CVE-2003-0083.
11 1 CVE-2002-0004 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
12 1 CVE-2002-0497 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
13 1 CVE-2002-1642 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of PostgreSQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
14 1 CVE-2002-1648 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
15 1 CVE-2002-1649 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
16 1 CVE-2002-1650 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of SquirrelMail as shipped with Red Hat Enterprise Linux 3 or 4.
17 1 CVE-2002-1850 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Apache HTTP server as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
18 1 CVE-2002-1903 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162899 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
19 1 CVE-2002-2013 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Mozilla as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
20 1 CVE-2002-2043 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue only affects a third-party patch to Cyrus SASL, not distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
21 1 CVE-2002-2061 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Mozilla as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
22 1 CVE-2002-2067 EAST Technologies 2006-12-20 Alexandra Preda This issue has been addressed in the latest version of our product, East-Tec Eraser 2007 and you may download it from http://www.east-tec.com
23 1 CVE-2002-2103 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Apache HTTP server as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
24 1 CVE-2002-2196 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
25 1 CVE-2002-2204 Red Hat 2006-08-30 Mark J Cox We do not believe this is a security vulnerability. This is the documented and expected behaviour of rpm.
26 1 CVE-2002-2210 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the RPM packages of OpenOffice as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
27 1 CVE-2003-0131 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
28 1 CVE-2003-0147 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
29 1 CVE-2003-0367 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
30 1 CVE-2003-0427 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
31 1 CVE-2003-0543 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
32 1 CVE-2003-0544 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
33 1 CVE-2003-0545 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
34 1 CVE-2003-0618 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=114923 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 4.
35 1 CVE-2003-0860 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
36 1 CVE-2003-0861 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
37 1 CVE-2003-0885 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of Xscreensaver as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
38 1 CVE-2003-1138 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue.
39 1 CVE-2003-1307 Red Hat 2006-10-25 Mark J Cox This is not a vulnerability. When PHP scripts are interpreted using the dynamically loaded mod_php DSO, the PHP interpreter executes with the privileges of the httpd child process. The PHP intepreter does not "sandbox" PHP scripts from the environment in which they run. On any modern Unix system a process can easily obtain access to all the parent file descriptors anyway, even if they have been closed.
40 1 CVE-2003-1308 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with fvwm, however this issue does not affect the included version of fvwm.
41 1 CVE-2004-0079 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
42 1 CVE-2004-0112 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
43 1 CVE-2004-0174 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect Linux.
44 1 CVE-2004-0175 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
45 1 CVE-2004-0230 Red Hat 2006-08-16 Mark J Cox The DHS advisory is a good source of background information about the issue: http://www.us-cert.gov/cas/techalerts/TA04-111A.html It is important to note that the issue described is a known function of TCP. In order to perform a connection reset an attacker would need to know the source and destination ip address and ports as well as being able to guess the sequence number within the window. These requirements seriously reduce the ability to trigger a connection reset on normal TCP connections. The DHS advisory explains that BGP routing is a specific case where being able to trigger a reset is easier than expected as the end points can be easily determined and large window sizes are used. BGP routing is also signficantly affected by having it?s connections terminated. The major BGP peers have recently switched to requiring md5 signatures which mitigates against this attack. The following article from Linux Weekly News also puts the flaw into context and shows why it does not pose a significant threat: http://lwn.net/Articles/81560/ Red Hat does not have any plans for action regarding this issue.
46 1 CVE-2004-0603 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
47 1 CVE-2004-0687 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
48 1 CVE-2004-0688 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
49 1 CVE-2004-0806 Red Hat 2006-08-30 Mark J Cox Not vulnerable. cdrecord is not shipped setuid and does not need to be made setuid with Red Hat Enterprise Linux 2.1, 3, or 4 packages.
50 1 CVE-2004-0811 Red Hat 2006-08-31 Mark J Cox Not Vulnerable. This issue only affected Apache 2.0.51, which was not shipped in any version of Red Hat Enterprise Linux.
51 1 CVE-2004-0829 Red Hat 2006-08-30 Mark J Cox We do not class this as a security issue; this can only cause a denial of service for the attacker.
52 1 CVE-2004-0914 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
53 1 CVE-2004-0941 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
54 1 CVE-2004-0967 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140074 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
55 1 CVE-2004-0971 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
56 1 CVE-2004-0975 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
57 1 CVE-2004-0976 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=140058 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
58 1 CVE-2004-0996 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
59 1 CVE-2004-1002 Red Hat 2006-08-30 Mark J Cox This issue is only will only cause a denial of service on the connection the attacker is using. It therefore is not a security issue.
60 1 CVE-2004-1051 Red Hat 2006-08-30 Mark J Cox We do not consider this to be a security issue: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1
61 1 CVE-2004-1170 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
62 1 CVE-2004-1177 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of mailman shipped with Red Hat Enterprise Linux 2.1, 3, or 4. In addition, we believe this issue does not apply to the 2.0.x versions of mailman due to setting of STEALTH_MODE
63 1 CVE-2004-1185 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
64 1 CVE-2004-1186 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
65 1 CVE-2004-1287 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
66 1 CVE-2004-1296 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
67 1 CVE-2004-1377 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
68 1 CVE-2004-1392 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
69 1 CVE-2004-1392 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
70 1 CVE-2004-1717 Red Hat 2006-08-30 Mark J Cox This CVE is a duplicate (rediscovery) of CVE-2002-0838
71 1 CVE-2004-1808 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=157663 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
72 1 CVE-2004-1880 Red Hat 2006-08-30 Mark J Cox Not vulnerable. These issues did not affect the versions of OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
73 1 CVE-2004-2300 Red Hat 2006-08-30 Mark J Cox Not vulnerable. We did not ship snmpd setuid root in Red Hat Enterprise Linux 2.1, 3, or 4.
74 1 CVE-2004-2343 Red Hat 2006-08-30 Mark J Cox Red Hat does not consider this to be a security issue.
75 1 CVE-2004-2546 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 3, or 4. Red Hat Enterprise Linux 2.1 shipped with a version of Samba prior to 3.0.6, but we verified by code audit that it is not affected by this issue.
76 1 CVE-2004-2654 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue only affected 2.5 STABLE4 and 2.5 STABLE5 versions of Squid and does not affect the versions of Squid distributed with Red Hat Enterprise Linux.
77 1 CVE-2005-0085 Red Hat 2006-08-30 Mark J Cox Not vulnerable. These issues did not affect the versions of htdig as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144263
78 1 CVE-2005-0109 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
79 1 CVE-2005-0256 Red Hat 2006-10-23 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with wu-ftpd, however we were unable to reproduce this issue. Additionally, a code analysis showed that attempts to exploit this issue would be caught in the versions we shipped. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=149720
80 1 CVE-2005-0373 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of Cyrus SASL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
81 1 CVE-2005-0448 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it for Red Hat Enterprise Linux 2.1 via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161054 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue was fixed in RHSA-2005:881 for Red Hat Enterprise Linux 3 This issue does not affect Red Hat Enterprise Linux 4
82 1 CVE-2005-0468 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
83 1 CVE-2005-0469 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
84 1 CVE-2005-0488 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
85 1 CVE-2005-0602 Red Hat 2006-08-30 Mark J Cox We do not consider this a security vulnerability; this is the expected behaviour.
86 1 CVE-2005-0605 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
87 1 CVE-2005-0758 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
88 1 CVE-2005-0953 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
89 1 CVE-2005-0988 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
90 1 CVE-2005-1038 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
91 1 CVE-2005-1111 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
92 1 CVE-2005-1119 Red Hat 2006-08-30 Mark J Cox We do not consider this a security issue, the bug can only manifest if the software is invoked on a sudoers file that is contained in a world writable directory.
93 1 CVE-2005-1194 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
94 1 CVE-2005-1228 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
95 1 CVE-2005-1229 Red Hat 2006-08-30 Mark J Cox This is defined and documented behaviour: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=156313
96 1 CVE-2005-1306 Red Hat 2006-08-30 Mark J Cox Not vulnerable. Adobe told us this issue did not affect the Linux version of Adobe Reader.
97 1 CVE-2005-1544 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
98 1 CVE-2005-1704 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
99 1 CVE-2005-1705 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
100 1 CVE-2005-1751 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158995 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
101 1 CVE-2005-1753 Red Hat 2006-08-30 Mark J Cox We do not believe this is a security issue; this is a deliberate circumvention of the Javamail API. The Javamail API provides a comprehensive and secure method to retrieve mail. In this example, the author retreives the message directly from the mail directory on the filesystem. Even if the user insists on using this incorrect way of accessing mail, then the permissions set by the dovecot and tomcat packages are enough to protect against direct access to most of the files listed in the bug report.
102 1 CVE-2005-2069 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
103 1 CVE-2005-2096 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
104 1 CVE-2005-2475 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=164927 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
105 1 CVE-2005-2541 Red Hat 2006-08-30 Mark J Cox This is the documented and expected behaviour of tar.
106 1 CVE-2005-2547 Red Hat 2006-08-30 Mark J Cox Not vulnerable. These issues did not affect the version of BlueZ as shipped with Red Hat Enterprise Linux 4.
107 1 CVE-2005-2642 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the Linux versions of Mutt.
108 1 CVE-2005-2666 Red Hat 2006-09-20 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162681 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
109 1 CVE-2005-2693 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
110 1 CVE-2005-2798 Red Hat 2006-11-20 Joshua Bressers This issue does not affect Red Hat Enterprise Linux 2.1 and 3. This flaw was fixed in Red Hat Enterprise Linux 4 via errata RHSA-2005:527: http://rhn.redhat.com/errata/RHSA-2005-527.html
111 1 CVE-2005-2929 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
112 1 CVE-2005-2946 Red Hat 2006-09-20 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169803 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
113 1 CVE-2005-2959 Red Hat 2006-08-30 Mark J Cox We do not consider this to be a security issue: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1
114 1 CVE-2005-2968 Red Hat 2006-08-30 Mark J Cox Not vulnerable. These issues did not affect the versions of Mozilla and Firefox as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
115 1 CVE-2005-2969 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
116 1 CVE-2005-2975 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
117 1 CVE-2005-2976 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
118 1 CVE-2005-2991 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the ncompress packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
119 1 CVE-2005-3011 Red Hat 2007-03-14 Mark J Cox Updated packages to correct this issue are available along with our advisory: http://rhn.redhat.com/errata/CVE-2005-3011.html Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
120 1 CVE-2005-3054 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
121 1 CVE-2005-3120 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
122 1 CVE-2005-3183 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=170518 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
123 1 CVE-2005-3186 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
124 1 CVE-2005-3191 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
125 1 CVE-2005-3192 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
126 1 CVE-2005-3193 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
127 1 CVE-2005-3258 Red Hat 2006-08-30 Mark J Cox Not vulnerable. These issues do not affect the versions of Squid as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
128 1 CVE-2005-3391 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
129 1 CVE-2005-3392 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
130 1 CVE-2005-3582 Red Hat 2006-08-16 Mark J Cox Not vulnerable. This issue is caused by the way ImageMagick was packaged by Gentoo and does not affect Red Hat Enterprise Linux packages.
131 1 CVE-2005-3624 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
132 1 CVE-2005-3625 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
133 1 CVE-2005-3626 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
134 1 CVE-2005-3627 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
135 1 CVE-2005-3628 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
136 1 CVE-2005-3964 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
137 1 CVE-2005-4268 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172865 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
138 1 CVE-2005-4348 Red Hat 2007-01-31 Mark J Cox The Red Hat Security Response Team has rated this issue as having low security impact. An update is available for Red Hat Enterprise Linux 4 to correct this issue: http://rhn.redhat.com/errata/RHSA-2007-0018.html This issue did not affect Red Hat Enterprise Linux 2.1 and 3.
139 1 CVE-2005-4442 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of OpenLDAP as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
140 1 CVE-2005-4481 Polopoly 2006-10-05 Jorgen Rydenius 1. The XSS flaw described was only part of the custom implementation of the http://www.polopoly.com/ site. It was never part of any version of any Polopoly product, nor delivered to any of Polopoly?s customers. 2. The XSS flaw that existed (the search form in the upper right corner) on the www.polopoly.com site has been fixed. 3. When www.polopoly.com had the XSS flaw it was based on Polopoly 8.6. Polopoly 9.x was never involved what so ever in this issue. And as I said earlier, the flaw was not part of Polopoly 8.6 either, it was only in custom implementation code of the www.polopoly.com site. 4. The www.polopoly.com site is not personalized nor permission controlled, so there was no information of any value to steal by exploiting the XSS flaw.
141 1 CVE-2005-4493 Speartek 2006-11-07 Jesse Heady We are aware of numerous existing script vulnerabilities and exploits and stand by the security of our system and our ability to address these. This particular exploit is not particularly serious as no sensitive or private user information is ever held within cookies during our checkout process. All user information and client information is secure in our platform. We take all security threats quite seriously and view the efforts of the author of this particular exploit as harmful to our professional image. This is especially important to note because the particular script vulnerability that has been raised poses no real threat to the stability or security of our systems. Again, we are formally responding to this posted cross-site script vulnerability to communicate that we take all such potential security issues very seriously and this particular issue has been addressed. In version 7.0.0 of our software, we have addressed the mentioned cross site scripting vulnerabilities. On any page that a form is on, the query string is sanitized to eliminate the vectors outlined in the XSS vulnerability. Form data is handled to protect against a form post from a different site to try and initialize a cross site scripting attacking via a form post. Sensitive data is not stored in session cookies and in the event that a cookie was stolen, it would contain nothing useful for the attacker. Our software is a hosted application, which allows us to make quick remedies as new exploits are found. Also, our system is monitored consistently and alerts are sent to our administrators when any malicious attempt is seen. The details of this alert include the data sent, from what referral and if there is a specific user that is being targeted on our system.
142 1 CVE-2005-4636 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of OpenOffice.org as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
143 1 CVE-2005-4667 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178960 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
144 1 CVE-2005-4745 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the FreeRADIUS packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
145 1 CVE-2005-4746 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue did not affect the FreeRADIUS packages as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
146 1 CVE-2005-4784 Red Hat 2006-08-30 Mark J Cox This issue did not affect the Linux glibc.
147 1 CVE-2005-4807 Red Hat 2006-08-24 Mark J Cox gas (and gcc) make no promise that they are fault tolerant to bad input. We do not plan on producing security updates for Red Hat Enterprise Linux to correct these bugs.
148 1 CVE-2005-4808 Red Hat 2006-08-24 Mark J Cox gas (and gcc) make no promise that they are fault tolerant to bad input. We do not plan on producing security updates for Red Hat Enterprise Linux to correct these bugs.
149 1 CVE-2006-0043 Red Hat 2006-08-30 Mark J Cox This issue did not affect Red Hat Enterprise Linux 2.1, 3, or 4.
150 1 CVE-2006-0225 Red Hat 2006-09-20 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=174026 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue has been fixed for Red Hat Enterprise Linux 3 in the following errata: http://rhn.redhat.com/errata/RHSA-2006-0298.html This issue has been fixed for Red Hat Enterprise Linux 4 in the following errata: http://rhn.redhat.com/errata/RHSA-2006-0044.html
151 1 CVE-2006-0236 Red Hat 2006-08-30 Mark J Cox Not vulnerable. We verified that this issue does not affect Linux versions of Thunderbird.
152 1 CVE-2006-0321 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of Fetchmail as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
153 1 CVE-2006-0405 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of libtiff as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
154 1 CVE-2006-0454 Red Hat 2006-09-17 Mark J Cox Not vulnerable. This vulnerability was introduced into the Linux kernel in version 2.6.12 and therefore does not affect users of Red Hat Enterprise Linux 2.1, 3, or 4.
155 1 CVE-2006-0459 Red Hat 2006-08-16 Mark J Cox This issue only affects parsers which are generated by grammars which either use REJECT or rules with a variable trailing context (in these rules the parser has to keep all backtracking paths). The Red Hat Security Response Team analysed all packages that include flex generated parsers in Red Hat Enterprise Linux (2.1, 3, and 4) and found none were vulnerable.
156 1 CVE-2006-0512 Mandriva 2006-10-04 Vincent Danen Mandriva has patched the migrationtools since August 2005 to use mktemp so is not vulnerable to this issue.
157 1 CVE-2006-0553 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of PostgreSQL as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
158 1 CVE-2006-0576 Red Hat 2006-09-20 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 3 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=207347 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue was fixed for Red Hat Enterprise Linux 4 in the following errata: http://rhn.redhat.com/errata/RHEA-2006-0355.html This issue does not affect Red Hat Enterprise Linux 2
159 1 CVE-2006-0670 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187945 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
160 1 CVE-2006-0730 Red Hat 2006-08-16 Mark J Cox This issue only affected Dovecot versions 1.0beta1 and 1.0beta2. Red Hat Enterprise Linux 4 shipped with an earlier version of Dovecot and is therefore not vulnerable to this issue.
161 1 CVE-2006-0743 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include log4net.
162 1 CVE-2006-0883 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
163 1 CVE-2006-0903 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1 and 3: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194613 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue has been fixed for Red Hat Enterprise Linux 4 in RHSA-2006:0544.
164 1 CVE-2006-1014 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
165 1 CVE-2006-1015 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
166 1 CVE-2006-1050 Kwik-Pay 2007-02-19 Alastair Robertson The kwikpay.mdb file supplied with kwikpay is a template for the database structure of user databases created by kwikpay and to store a demonstration payroll. It does not contain any sensitive user information. The file is open for view by any user by design. We do not consider it to be a security vulnerability.
167 1 CVE-2006-1057 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188302 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 and 3.
168 1 CVE-2006-1058 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187385 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
169 1 CVE-2006-1095 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of mod_python as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
170 1 CVE-2006-1168 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
171 1 CVE-2006-1174 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193053 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
172 1 CVE-2006-1251 Red Hat 2006-08-30 Mark J Cox Not vulnerable. greylistclean.cron is not supplied in the exim packages as distributed with Red Hat Enterprise Linux.
173 1 CVE-2006-1372 Benson Solutions 2007-01-03 Greg Benson WebCalendar v4 has been updated to include fixes that filter the url numeric and date variables in question and prevent non-numeric and non-date values from being passed to the SQL queries. This fixes the problems with the pages in question. http://www.bensonitsolutions.com/Calendar/v4/
174 1 CVE-2006-1494 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of OpenSSH as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
175 1 CVE-2006-1542 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187900 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
176 1 CVE-2006-1608 Red Hat 2006-08-30 Mark J Cox We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
177 1 CVE-2006-1624 Mandriva 2006-07-20 Vincent Danen Mandriva does not enable the -r option in syslogd per default, which prevents syslogd from listening for remote events. The -x option is also described in /etc/sysconfig/syslog for those who wish to enable the -r option.
178 1 CVE-2006-1624 Red Hat 2006-12-06 Joshua Bressers Red Hat does not consider this to be a security issue. Enabling the -r option is not suggested without the -x option which is clearly documented in the /etc/sysconfig/syslog configuration file.
179 1 CVE-2006-2073 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192192 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
180 1 CVE-2006-2083 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue does not affect the versions of rsync distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
181 1 CVE-2006-2193 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194362 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 and 3 Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
182 1 CVE-2006-2194 Red Hat 2006-08-16 Mark J Cox Not vulnerable. The winbind plugin is not shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
183 1 CVE-2006-2369 Red Hat 2006-08-16 Mark J Cox This issue only affected version 4.1.1 and not the versions distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
184 1 CVE-2006-2414 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue does not affect the versions of Dovecot distributed with Red Hat Enterprise Linux.
185 1 CVE-2006-2440 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=192278 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
186 1 CVE-2006-2450 Red Hat 2006-08-24 Mark J Cox Not vulnerable. This issue does not affect the versions of LibVNCServer as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
187 1 CVE-2006-2502 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue does not affect the versions of cyrus-imapd distributed with Red Hat Enterprise Linux.
188 1 CVE-2006-2563 Red Hat 2006-09-20 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
189 1 CVE-2006-2607 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
190 1 CVE-2006-2656 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193166 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
191 1 CVE-2006-2660 Red Hat 2006-08-30 Mark J Cox This is not an issue that affects users of Red Hat Enterprise Linux. http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=196255
192 1 CVE-2006-2754 Red Hat 2006-08-16 Mark J Cox This issue is not exploitable as the status file is only written to and read by the slurpd process. Therefore this is not a vulnerability that affects Red Hat Enterprise Linux 2.1, 3, or 4.
193 1 CVE-2006-2789 Red Hat 2006-08-30 Mark J Cox Not vulnerable. This issue does not affect the versions of Evolution as distributed with Red Hat Enterprise Linux.
194 1 CVE-2006-2906 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
195 1 CVE-2006-2916 Red Hat 2006-08-16 Mark J Cox Not vulnerable. We do not ship aRts as setuid root on Red Hat Enterprise Linux 2.1, 3, or 4.
196 1 CVE-2006-2937 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
197 1 CVE-2006-2940 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
198 1 CVE-2006-3005 Red Hat 2006-08-24 Mark J Cox Red Hat does not consider this a security issue. It is expected behavior that a large input file will cause the processing program to use a large amount of memory.
199 1 CVE-2006-3011 Red Hat 2006-09-20 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
200 1 CVE-2006-3018 Red Hat 2006-09-20 Mark J Cox Unknown: CVE-2006-3018 has been assigned to an issue in PHP where the cause and fix are unknown, and the impact cannot be verified. The source of the CVE assignment was a single line statement in the PHP 5.1.3 release announcement, http://www.php.net/release_5_1_3.php, reading: "Fixed a heap corruption inside the session extension." Of the changes made to the session extension between releases 5.1.2 and 5.1.3, none would fix a bug matching this description by our analysis.
201 1 CVE-2006-3083 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
202 1 CVE-2006-3093 Red Hat 2006-08-16 Mark J Cox Not vulnerable. Adobe told us that this issue does not affect the Linux versions of Adobe Acrobat Reader.
203 1 CVE-2006-3145 Red Hat 2006-08-30 Mark J Cox This issue did not affect the versions of NetPBM distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
204 1 CVE-2006-3174 Red Hat 2006-08-30 Mark J Cox This issue has not been able to be reproduced by upstream or after a Red Hat code review. We therefore do not believe this is a security vulnerability.
205 1 CVE-2006-3334 Red Hat 2006-08-16 Mark J Cox On Red Hat Enterprise Linux 2.1, 3, and 4 this is a two-byte overflow into the middle of the stack and is not exploitable.
206 1 CVE-2006-3376 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
207 1 CVE-2006-3378 Red Hat 2006-08-16 Mark J Cox This issue affects the version of the passwd command from the shadow-utils package. Red Hat Enterprise Linux 2.1, 3, and 4 are not vulnerable to this issue.
208 1 CVE-2006-3459 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
209 1 CVE-2006-3460 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
210 1 CVE-2006-3461 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
211 1 CVE-2006-3462 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
212 1 CVE-2006-3463 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
213 1 CVE-2006-3464 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
214 1 CVE-2006-3465 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
215 1 CVE-2006-3467 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
216 1 CVE-2006-3469 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
217 1 CVE-2006-3486 Red Hat 2006-07-19 Mark J Cox We do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue.
218 1 CVE-2006-3587 Red Hat 2006-08-16 Mark J Cox Adobe gave a statement that these issues do not affect the Linux versions of Macromedia Flash Player.
219 1 CVE-2006-3588 Red Hat 2006-08-16 Mark J Cox Adobe gave a statement that these issues do not affect the Linux versions of Macromedia Flash Player.
220 1 CVE-2006-3619 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198912 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
221 1 CVE-2006-3626 Red Hat 2006-07-19 Mark J Cox This vulnerability does not affect Red Hat Enterprise Linux 2.1 or 3 as they are based on 2.4 kernels. The exploit relies on the kernel supporting the a.out binary format. Red Hat Enterprise Linux 4, Fedora Core 4, and Fedora Core 5 do not support the a.out binary format, causing the exploit to fail. We are not currently aware of any way to exploit this vulnerability if a.out binary format is not enabled. In addition, a default installation of these OS enables SELinux in enforcing mode. SELinux also completely blocks attempts to exploit this issue. https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198973#c10
222 1 CVE-2006-3672 Red Hat 2006-08-30 Mark J Cox We do not consider a crash of a client application such as Konqueror to be a security issue.
223 1 CVE-2006-3731 Red Hat 2006-08-30 Mark J Cox We do not consider a user-assisted crash of a client application such as Firefox to be a security issue.
224 1 CVE-2006-3738 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
225 1 CVE-2006-3742 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
226 1 CVE-2006-3743 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
227 1 CVE-2006-3744 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
228 1 CVE-2006-3747 Red Hat 2006-07-31 Mark J Cox The ability to exploit this issue is dependent on the stack layout for a particular compiled version of mod_rewrite. If the compiler has added padding to the stack immediately after the buffer being overwritten, this issue can not be exploited, and Apache httpd will continue operating normally. The Red Hat Security Response Team analyzed Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4 binaries for all architectures as shipped by Red Hat and determined that these versions cannot be exploited. This issue does not affect the version of Apache httpd as supplied with Red Hat Enterprise Linux 2.1
229 1 CVE-2006-3835 Red Hat 2006-08-24 Mark J Cox This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled. Details on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing
230 1 CVE-2006-3879 Red Hat 2006-08-16 Mark J Cox This issue does not affect versions of Mikmod 3.2.0-beta2 or prior. Versions of Mikmod distributed with Red Hat Enterprise Linux 2.1, 3, and 4 are based on version 3.1.11 and are therefore not vulnerable to this issue.
231 1 CVE-2006-4031 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=202246 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3
232 1 CVE-2006-4095 Red Hat 2006-09-06 Mark J Cox Not Vulnerable. The version of BIND that ships with Red Hat Enterprise Linux is not vulnerable to this issue as it does not handle signed RR records.
233 1 CVE-2006-4096 Red Hat 2006-09-08 Mark J Cox Not Vulnerable. This issue was found and fixed as part of Red Hat Enterprise Linux 4 update 4: http://rhn.redhat.com/errata/RHBA-2006-0288.html and Red Hat Enterprise Linux 3 update 8: http://rhn.redhat.com/errata/RHBA-2006-0287.html This issue does not affect Red Hat Enterprise Linux 2.1
234 1 CVE-2006-4124 Red Hat 2006-08-16 Mark J Cox LessTif is shipped with Red Hat Enterprise Linux 2.1 but not 3 or 4. On Enterprise Linux 2.1 we build LessTif with debugging disabled, so the DEBUG_FILE environment variable is ignored and this issue cannot be exploited.
235 1 CVE-2006-4144 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
236 1 CVE-2006-4146 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204841 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
237 1 CVE-2006-4181 Red Hat 2006-12-04 Joshua Bressers Not Vulnerable. Red Hat does not ship GNU Radius in Red Hat Enterprise Linux 2.1, 3, or 4.
238 1 CVE-2006-4192 Red Hat 2007-01-26 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 3 and 4: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=224032 This issue did not affect Red Hat Enterprise Linux 2.1 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
239 1 CVE-2006-4206 ASPPlayground.NET 2006-12-20 Samuel Chou The issue has been fixed in the latest round of patch released on Oct 15, 2006.
240 1 CVE-2006-4226 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1 or 3
241 1 CVE-2006-4227 Red Hat 2006-08-24 Mark J Cox Not vulnerable. These issues do not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
242 1 CVE-2006-4262 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203645 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
243 1 CVE-2006-4310 Red Hat 2006-09-21 Joshua Bressers Red Hat does not consider this flaw a security issue. This flaw is the result of a NULL pointer dereference, which is not exploitable and can only cause a client crash.
244 1 CVE-2006-4334 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
245 1 CVE-2006-4335 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=220595 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
246 1 CVE-2006-4336 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
247 1 CVE-2006-4337 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=220595 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
248 1 CVE-2006-4338 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=220595 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
249 1 CVE-2006-4339 Red Hat 2007-03-14 Mark J Cox Vulnerable. This issue affects OpenSSL and OpenSSL compatibility packages in Red Hat Enterprise Linux 2.1, 3, and 4. Updates, along with our advisory are available at the URL below. http://rhn.redhat.com/errata/RHSA-2006-0661.html Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
250 1 CVE-2006-4343 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
251 1 CVE-2006-4434 Red Hat 2006-08-30 Mark J Cox This flaw causes a crash but does not result in a denial of service against Sendmail and is therefore not a security issue.
252 1 CVE-2006-4447 Red Hat 2006-09-12 Mark J Cox Not Vulnerable. This issue does not exist in Red Hat Enterprise Linux 2.1 or 3. This issue not exploitable in Red Hat Enterprise Linux 4. A detailed analysis of this issue can be found in the Red Hat Bug Tracking System: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195555
253 1 CVE-2006-4481 Red Hat 2006-09-20 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
254 1 CVE-2006-4513 Red Hat 2007-02-09 Mark J Cox Not vulnerable. This issue did not affect versions of wvWare library included in koffice packages as shipped with Red Hat Enterprise Linux 2.1
255 1 CVE-2006-4514 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
256 1 CVE-2006-4572 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
257 1 CVE-2006-4600 Red Hat 2006-09-20 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205826 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
258 1 CVE-2006-4623 Red Hat 2006-09-21 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204912 This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
259 1 CVE-2006-4624 Red Hat 2006-09-19 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205651 The Red Hat Security Response Team has rated this issue as having low security impact and expects to release a future update to address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
260 1 CVE-2006-4625 Red Hat 2006-09-20 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
261 1 CVE-2006-4759 PunBB 2006-09-28 Rickard Andersson PunBB 1.2.13 has been released to fix this vulnerability. The updated version is available at http://punbb.org/downloads.php.
262 1 CVE-2006-4790 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
263 1 CVE-2006-4806 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
264 1 CVE-2006-4807 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
265 1 CVE-2006-4808 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
266 1 CVE-2006-4809 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 do not include imlib2.
267 1 CVE-2006-4810 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
268 1 CVE-2006-4811 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
269 1 CVE-2006-4812 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
270 1 CVE-2006-4814 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
271 1 CVE-2006-4842 Red Hat 2007-01-11 Mark J Cox This issue also affects other OS that use NSPR. However, Red Hat does not ship any application linked setuid or setgid against NSPR and therefore is not vulnerable to this issue.
272 1 CVE-2006-4924 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
273 1 CVE-2006-4925 Red Hat 2006-10-31 Joshua Bressers Red Hat does not consider this flaw a security issue. This flaw can cause an OpenSSH client to crash when connecting to a malicious server, which does not result in a denial of service condition.
274 1 CVE-2006-4980 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
275 1 CVE-2006-5051 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
276 1 CVE-2006-5052 Red Hat 2006-10-31 Joshua Bressers Not Vulnerable. After extensive research and numerous upstream queries regarding this issue, Red Hat does not believe it exists. There is no evidence to suggest this issue existed or was fixed in any version of portable OpenSSH.
277 1 CVE-2006-5158 Red Hat 2006-10-16 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210128 This issue does not affect Red Hat Enterprise Linux 2.1 or 3.
278 1 CVE-2006-5159 Red Hat 2006-10-16 Joshua Bressers Red Hat does not consider this issue to be a security vulnerability. We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat. In the event more information becomes available, we will revisit this issue in the future.
279 1 CVE-2006-5160 Red Hat 2006-10-16 Joshua Bressers Red Hat does not consider this issue to be a security vulnerability. We have been in contact with the upstream project regarding this problem and agree that this issue currently poses no security threat. In the event more information becomes available, we will revisit this issue in the future.
280 1 CVE-2006-5173 Red Hat 2006-11-03 Joshua Bressers Not Vulnerable. This flaw only affects kernel versions 2.6.14 to 2.6.18. Red Hat Enterprise Linux 2.1, 3, and 4 does not ship with a vulnerable kernel version.
281 1 CVE-2006-5178 Red Hat 2006-12-04 Joshua Bressers We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
282 1 CVE-2006-5214 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
283 1 CVE-2006-5215 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
284 1 CVE-2006-5229 Red Hat 2006-10-11 Joshua Bressers Red Hat has been unable to reproduce this flaw and believes that the reporter was experiencing behavior specific to his environment. We will not be releasing update to address this issue.
285 1 CVE-2006-5297 Red Hat 2007-03-14 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=211085 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
286 1 CVE-2006-5298 Red Hat 2007-03-14 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=211085 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
287 1 CVE-2006-5397 Red Hat 2007-03-14 Mark J Cox Not vulnerable. These issues did not affect the versions of libX11 as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
288 1 CVE-2006-5456 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
289 1 CVE-2006-5465 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
290 1 CVE-2006-5466 Red Hat 2007-03-14 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213515 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
291 1 CVE-2006-5467 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
292 1 CVE-2006-5619 Red Hat 2006-11-07 Joshua Bressers Red Hat is aware of this issue and are tracking it via bug 213214 for Red Hat Enterprise Linux 4: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=213214 This issue does not affect Red Hat Enterprise Linux 2.1 or 3
293 1 CVE-2006-5621 Rave 2006-12-12 Peter Graham Ask_rave 0.9b has been released for immediate download and versions 0.9PR and below have been rendered obsolete. All users using versions 0.9PR and prior are recommended to upgrade their versions immediately. Users can use the following URI to download this new version: http://rave.jk-digital.com/site/scripts/ask.php
294 1 CVE-2006-5633 Red Hat 2006-11-07 Joshua Bressers Red Hat does not consider a user-assisted crash of a client application such as Firefox to be a security issue.
295 1 CVE-2006-5701 Red Hat 2007-03-14 Joshua Bressers Not Vulnerable. The squashfs module is not distributed as part of Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
296 1 CVE-2006-5706 Red Hat 2006-11-10 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
297 1 CVE-2006-5749 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
298 1 CVE-2006-5751 Red Hat 2006-12-12 Joshua Bressers This flaw does not affect the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3. This flaw affects the Linux kernel shipped with Red Hat Enterprise Linux 4. We are tracking this flaw via bug 216452: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=216452
299 1 CVE-2006-5753 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
300 1 CVE-2006-5757 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
301 1 CVE-2006-5767 Drake CMS 2006-12-20 Daniele C. The Drake Team has published an apposite news about the vulnerability: http://sourceforge.net/forum/forum.php?forum_id=636860. It is important to specify that this is an alpha product because it is intended for testers and we already disclaim its usage in production websites through an install notice; we will conduct deep security tests during the beta stage of our development chain. We discontinue the download of each alpha release when a new one is available, so the up-to-date release available at http://sourceforge.net/projects/drakecms is already fixed for the vulnerability.
302 1 CVE-2006-5779 Red Hat 2007-03-14 Joshua Bressers Not Vulnerable. The OpenLDAP versions shipped with Red Hat Enterprise Linux 4 and earlier do not contain the vulnerable code in question. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
303 1 CVE-2006-5794 Red Hat 2007-03-14 Joshua Bressers Red Hat is aware of this issue and is tracking it via bug 214640: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214640 for Red hat Enterprise Linux 3 and 4. This issue does not affect Red Hat Enterprise Linux 2.1 The Red Hat Security Response Team has rated this issue as having low security impact, a future update will address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
304 1 CVE-2006-5823 Red Hat 2007-03-14 Joshua Bressers The CVE-2006-5823 is about a corrupted cramfs (MOKB-07-11-2006) that can cause a memory corruption and so crash the machine. For Red Hat Enterpise Linux 3 this issue is tracked via Bugzilla #216960 and for Red Hat Enterprise Linux 4 it is tracked via Bugzilla #216958. Red Hat Enterprise Linux 2.1 is not vulnerable to this issue. This issue has been rated as having low impact, because root privileges or physical access to the machine are needed to mount a corrupted filesystem and crash the machine. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
305 1 CVE-2006-5840 abarcar Software 2006-12-20 Helmut Fleischhauer The version 5.1.5 of the abarcar Realty Portal has been discontinued 2003. The version 6.xx has been discontinued beginning 2006. A fix for above versions has been available since that time. As of version 7.0 static pages are created - a parameter for cat.php is no longer used - the routine for news has been dropped and a different routine creating static pages is used - slistl.php never existed in the Realty Portal
306 1 CVE-2006-5864 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1. This issue did not affect Red Hat Enterprise Linux 3 or 4. https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=215593 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
307 1 CVE-2006-5868 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
308 1 CVE-2006-5870 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
309 1 CVE-2006-5876 Red Hat 2007-03-14 Mark J Cox Not vulnerable. The vulnerable code is not used by any application likned with libsoup shipped with Red Hat Enterprise Linux 2.1, 3, and 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
310 1 CVE-2006-5969 Red Hat 2006-11-22 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1 shipped with fvwm, however this issue does not affect the included version of fvwm.
311 1 CVE-2006-5974 Red Hat 2007-01-11 Mark J Cox Not vulnerable. This issue does not affect the versions of fetchmail distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
312 1 CVE-2006-5989 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
313 1 CVE-2006-6015 Red Hat 2006-12-04 Joshua Bressers Red Hat does not consider unexploitable client application crashes to be security flaws. This bug causes a stack recursion crash which is not exploitable.
314 1 CVE-2006-6027 Red Hat 2006-11-23 Mark J Cox Not vulnerable. This issue did not affect Linux versions of Adobe Reader.
315 1 CVE-2006-6053 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
316 1 CVE-2006-6054 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
317 1 CVE-2006-6056 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
318 1 CVE-2006-6057 Red Hat 2007-03-14 Joshua Bressers Not Vulnerable. The kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 do not contain gfs2 filesystem support. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
319 1 CVE-2006-6097 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
320 1 CVE-2006-6101 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
321 1 CVE-2006-6102 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
322 1 CVE-2006-6103 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
323 1 CVE-2006-6105 Red Hat 2007-03-14 Mark J Cox Not vulnerable. This flaw was first introduced in gdm version 2.14. Therefore these issues did not affect the earlier versions of gdm as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
324 1 CVE-2006-6106 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it for Red Hat Enterprise Linux 4 via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218602 This issue does not affect the version of the Linux kernel shipped with Red Hat Enterprise Linux 2.1 or 3. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
325 1 CVE-2006-6107 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
326 1 CVE-2006-6142 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
327 1 CVE-2006-6143 Red Hat 2007-03-14 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 ship with versions of Kerberos 5 prior to version 1.4 and are therefore not affected by these vulnerabilities. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
328 1 CVE-2006-6144 Mandriva 2007-01-19 Vincent Danen Not vulnerable. Mandriva 2007.0 and earlier ship with Kerberos 5 version 1.4.x and as a result are not vulnerable to these issues.
329 1 CVE-2006-6144 Red Hat 2007-03-14 Mark J Cox Not vulnerable. Red Hat Enterprise Linux 2.1, 3, and 4 ship with versions of Kerberos 5 prior to version 1.4 and are therefore not affected by these vulnerabilities. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
330 1 CVE-2006-6169 Red Hat 2007-03-14 Joshua Bressers Red Hat does not consider this bug to be a security flaw. In order for this flaw to be exploited, a user would be required to enter shellcode into an interactive GnuPG session. Red Hat considers this to be an unlikely scenario. Red Hat Enterprise Linux 5 contains a backported patch to address this issue.
331 1 CVE-2006-6235 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
332 1 CVE-2006-6236 Red Hat 2006-12-19 Mark J Cox Not vulnerable. This issue does not affect the Linux version of Adobe Reader.
333 1 CVE-2006-6297 Red Hat 2006-12-19 Mark J Cox We do not consider a crash of a client application such as Konqueror or other KFile users to be a security issue.
334 1 CVE-2006-6303 Red Hat 2007-03-14 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218287 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
335 1 CVE-2006-6305 Red Hat 2007-03-14 Joshua Bressers Not vulnerable. This issue does not affect the versions of net-smtp as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
336 1 CVE-2006-6383 Red Hat 2006-12-19 Mark J Cox We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php
337 1 CVE-2006-6385 Red Hat 2006-12-08 Joshua Bressers Not Vulnerable. eEye Research advisory AD20061207 (Intel Network Adapter Driver Local Privilege Escalation) describes a flaw in the Linux Kernel drivers for the e100, e1000, and ixgb Intel network cards. The flaw affects the NDIS miniport drivers and its OID support. The Linux Kernel drivers do not support the NDIS API and the OID concept from Microsoft Windows.
338 1 CVE-2006-6493 Red Hat 2006-12-19 Mark J Cox Not vulnerable. OpenLDAP as shipped with Red Hat Enterprise Linux 2.1, 3, and 4 does not support the LDAP_AUTH_KRBV41 authentication method.
339 1 CVE-2006-6628 Red Hat 2007-01-15 Joshua Bressers Red Hat does not consider this flaw a security issue. This flaw will only crash OpenOffice.org and presents no possibility for arbitrary code execution.
340 1 CVE-2006-6660 Red Hat 2007-02-02 Mark J Cox Not vulnerable. This issue did not affect the versions of KDE as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
341 1 CVE-2006-6698 Red Hat 2007-01-11 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=219279 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
342 1 CVE-2006-6719 Red Hat 2007-03-14 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=221459 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
343 1 CVE-2006-6772 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
344 1 CVE-2006-6811 Red Hat 2007-01-18 Mark J Cox We do not consider a crash of a client application such as KsIRC to be a security issue.
345 1 CVE-2006-6939 Red Hat 2007-01-18 Mark J Cox Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223072 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.
346 1 CVE-2006-7051 Red Hat 2007-03-14 Mark J Cox This issue can only be exploited if pending signals (ulimit -i) is set to "unlimited". In case of Red Hat Enterprise Linux version 2.1, 3 and 4 this is not the case and therefore they are not vulnerable to this issue.
347 1 CVE-2006-7098 Red Hat 2007-03-05 Mark J Cox Not vulnerable. This issue was specific to a Debian patch to Apache HTTP Server.
348 1 CVE-2006-7108 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
349 1 CVE-2006-7139 Red Hat 2007-03-08 Mark J Cox Not vulnerable. Our testing found that this issue did not affect the versions of Kmail as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
350 1 CVE-2007-0003 Red Hat 2007-01-24 Mark J Cox Not vulnerable. These issues did not affect the versions of pam as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
351 1 CVE-2007-0010 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
352 1 CVE-2007-0059 Apple 2007-03-19 Ron Dumont This issue is addressed in QuickTime 7.1.5, which was released on March 5. Information on the security fixes provided in QuickTime 7.1.5, and links to obtain the update are provided in: http://docs.info.apple.com/article.html?artnum=305149
353 1 CVE-2007-0080 Red Hat 2007-01-05 Mark J Cox Not vulnerable. The affected code is in an optional module that is not shipped in Red Hat Enterprise Linux 2.1, 3, or 4.
354 1 CVE-2007-0086 Red Hat 2007-01-11 Mark J Cox Red Hat does not consider this issue to be a security vulnerability. The pottential attacker has to send acknowledgement packets periodically to make server generate traffic. Exactly the same effect could be achieved by simply downloading the file. The statement that setting the TCP window size to arbitrarily high value would permit the attacker to disconnect and stop sending ACKs is false, because Red Hat Enterprise Linux limits the size of the TCP send buffer to 4MB by default.
355 1 CVE-2007-0104 Red Hat 2007-01-15 Joshua Bressers Not Vulnerable. This flaw is the result of an infinite recursion flaw in xpdf, which cannot result in arbitrary code execution.
356 1 CVE-2007-0120 Acunetix Limited 2007-01-31 Kevin J. Vella Information about HTTP Sniffer: The HTTP Sniffer is an in-build proxy server in Acunetix WVS which purpose is to analyse web traffic between a web client (browser) and a web server. By default this tool is not enabled and when enabled it accepts traffic only from the same computer running Acunetix WVS (Localhost). The default TCP port used in 8080. This means that when the HTTP Sniffer is enabled, it is only enabled on the local network interface and no one from the network can access the HTTP Sniffer port. How the exploit works: The exploit works by sending a specially crafted packet containing an invalid Content-Length field in the HTTP header to the TCP port on which the HTTP Sniffer is listening. This causes the application to crash (Denial of Service). Since the HTTP Sniffer component by default is enabled only on the local network interface, it is not possible to take advantage of this exploit remotely. The user has to manually change the listening interface from within the application?s configuration to make the HTTP Sniffer available on the network for this exploit to work remotely. Solution: Upgrade to the latest version of Acunetix WVS (v4.0 build 20060717 or later)
357 1 CVE-2007-0157 Red Hat 2007-01-15 Mark J Cox Not vulnerable. This issue does not affect the older versions of neon as shipped with Red Hat Enterprise Linux 2.1, 3, and 4. This issue also does not affect the older versions of neon included in the cadaver package.
358 1 CVE-2007-0227 Mandriva 2007-01-19 Vincent Danen Not vulnerable. This issue does not affect the versions of slocate as shipped with Mandriva Linux 2007.0 or earlier.
359 1 CVE-2007-0227 Red Hat 2007-01-18 Mark J Cox Not vulnerable. This issue did not affect the versions of slocate as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
360 1 CVE-2007-0235 Red Hat 2007-03-14 Joshua Bressers Not vulnerable. This issue did not affect the versions of libgtop as shipped with Red Hat Enterprise Linux 2.1, 3, or 4. Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
361 1 CVE-2007-0247 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
362 1 CVE-2007-0248 Red Hat 2007-03-14 Mark J Cox Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
363 1 CVE-2007-0453 Red Hat 2007-02-13 Mark J Cox Not vulnerable. These issues did not affect the Linux versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
364 1 CVE-2007-0454 Red Hat 2007-02-13 Mark J Cox Not vulnerable. These issues affect the AFS ACL module which is not distributed with Samba in Red Hat Enterprise Linux 2.1, 3, or 4.
365 1 CVE-2007-0493 Red Hat 2007-01-29 Joshua Bressers Not vulnerable. This issue did not affect the versions of ISC BIND as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
366 1 CVE-2007-0537 Red Hat 2007-02-15 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225414 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
367 1 CVE-2007-0650 Red Hat 2007-02-13 Mark J Cox Red Hat does not consider this issue to be a security vulnerability. The user would have to voluntarily interact with the attack mechanism to exploit the flaw, and the result would be the ability to run code as themselves.
368 1 CVE-2007-0770 Red Hat 2007-02-14 Mark J Cox Not vulnerable. Red Hat did not ship the incomplete patch for CVE-2006-5456 and is therefore not affected by this issue.
369 1 CVE-2007-0822 Red Hat 2007-02-09 Mark J Cox Red Hat does not consider this issue to be a security vulnerability. On Red Hat Enterprise Linux processes that change their effective UID do not dump core by default when they receive a fatal signal. Therefore the NULL pointer dereference does not lead to an information leak.
370 1 CVE-2007-0823 Red Hat 2007-02-09 Mark J Cox Red Hat does not consider this issue to be a security vulnerability. It is correct and expected behavior for xterm not to zero-fill its scrollback buffer upon reception of terminal clear excape sequence.
371 1 CVE-2007-0879 SmidgeonSoft 2007-02-19 Russell Osterlund Unusually large strings would crash the display. The bug has been fixed in the following releases: PEBrowse Professional - v8.2.3 PEBrowse Professional Interactive - v8.2.4 PEBrowse Crash-Dump Analyzer - v2.6.8
372 1 CVE-2007-0911 Red Hat 2007-02-16 Mark J Cox Not vulnerable. This flaw is a regression of the fix for CVE-2007-0906 affecting PHP version 5.2.1 only which results in any use of str_replace() causing a crash regardless of user input. These issues did not affect the versions of PHP as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.
373 1 CVE-2007-1396 Red Hat 2007-03-19 Mark J Cox Red Hat does not consider this to be a security vulnerability. Using import_request_variables() is generally a discouraged practice and it is improper use that can lead to security problems, not flaw of PHP itself.
374 1 CVE-2007-1401 Red Hat 2007-03-19 Mark J Cox Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include Cracklib support.
375 1 CVE-2007-1411 Red Hat 2007-03-19 Mark J Cox Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include mssql support.
376 1 CVE-2007-1412 Red Hat 2007-03-19 Mark J Cox Not vulnerable. PHP as shipped with Red Hat Enterprise Linux 2.1, 3, 4, and 5 does not include ClibPDF support.
377 1 CVE-2007-1413 Red Hat 2007-03-19 Mark J Cox Not vulnerable. The php-snmp package as shipped with Red Hat Enterprise Linux 4 and 5 use net-snmp which is not vulnerable to this issue.
378 1 CVE-2007-1420 Red Hat 2007-03-23 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232603 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ This issue does not affect Red Hat Enterprise Linux 2.1, 3, or 4.
379 1 CVE-2007-1564 Red Hat 2007-03-23 Joshua Bressers Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233592 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/