Show filters
81 Total Results
Displaying 71-80 of 81
Sort by:
Attacker Value
Unknown
CVE-2011-2189
Disclosure Date: October 10, 2011 (last updated November 24, 2024)
net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
0
Attacker Value
Unknown
CVE-2011-2925
Disclosure Date: September 20, 2011 (last updated October 04, 2023)
Cumin in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0 records broker authentication credentials in a log file, which allows local users to bypass authentication and perform unauthorized actions on jobs and message queues via a direct connection to the broker.
0
Attacker Value
Unknown
CVE-2010-4526
Disclosure Date: January 11, 2011 (last updated October 04, 2023)
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
0
Attacker Value
Unknown
CVE-2010-4179
Disclosure Date: December 07, 2010 (last updated October 04, 2023)
The installation documentation for Red Hat Enterprise Messaging, Realtime and Grid (MRG) 1.3 recommends that Condor should be configured so that the MRG Management Console (cumin) can submit jobs for users, which creates a trusted channel with insufficient access control that allows local users with the ability to publish to a broker to run jobs as arbitrary users via Condor QMF plug-ins.
0
Attacker Value
Unknown
CVE-2009-5005
Disclosure Date: October 18, 2010 (last updated October 04, 2023)
The Cluster::deliveredEvent function in cluster/Cluster.cpp in Apache Qpid, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote attackers to cause a denial of service (daemon crash and cluster outage) via invalid AMQP data.
0
Attacker Value
Unknown
CVE-2009-5006
Disclosure Date: October 18, 2010 (last updated October 04, 2023)
The SessionAdapter::ExchangeHandlerImpl::checkAlternate function in broker/SessionAdapter.cpp in the C++ Broker component in Apache Qpid before 0.6, as used in Red Hat Enterprise MRG before 1.3 and other products, allows remote authenticated users to cause a denial of service (NULL pointer dereference, daemon crash, and cluster outage) by attempting to modify the alternate of an exchange.
0
Attacker Value
Unknown
CVE-2010-3701
Disclosure Date: October 12, 2010 (last updated October 04, 2023)
lib/MessageStoreImpl.cpp in Red Hat Enterprise MRG before 1.2.2 allows remote authenticated users to cause a denial of service (stack memory exhaustion and broker crash) via a large persistent message.
0
Attacker Value
Unknown
CVE-2010-3083
Disclosure Date: October 12, 2010 (last updated October 04, 2023)
sys/ssl/SslSocket.cpp in qpidd in Apache Qpid, as used in Red Hat Enterprise MRG before 1.2.2 and other products, when SSL is enabled, allows remote attackers to cause a denial of service (daemon outage) by connecting to the SSL port but not participating in an SSL handshake.
0
Attacker Value
Unknown
CVE-2009-4133
Disclosure Date: December 23, 2009 (last updated October 04, 2023)
Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.
0
Attacker Value
Unknown
CVE-2009-3547
Disclosure Date: November 04, 2009 (last updated November 04, 2023)
Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
0