The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Woody

NDISWrapper: buffer overflows
A WiFi attacker can create several overflows in NDISWrapper in order to execute code on the system...
CVE-2008-4395, DSA-1731-1, SUSE-SA:2008:057, VIGILANCE-VUL-8229
GNU Enscript: buffer overflow via escape setfilename
An attacker can invite the victim to convert a malicious file with GNU Enscript in order to execute code on his computer...
BID-31858, CERTA-2002-AVI-207, CVE-2008-3863, DSA-1670-1, FEDORA-2008-9351, FEDORA-2008-9372, MDVSA-2008:243, RHSA-2008:1016-01, RHSA-2008:1021-02, SUSE-SR:2008:024, VIGILANCE-VUL-8225
Linux kernel: memory corruption of vDSO
A local attacker can create a memory corruption in vDSO in order to generate a denial of service or to elevate his privileges...
460251, BID-32099, CERTA-2002-AVI-217, CVE-2008-3527, DSA-1687-1, RHSA-2008:0957-02, SUSE-SR:2008:025, VIGILANCE-VUL-8219
CUPS: several vulnerabilities
Several vulnerabilities of CUPS can be used by an attacker to create a denial of service or to execute code...
261088, 6765712, BID-31688, BID-31690, CERTA-2002-AVI-192, CERTA-2008-AVI-493, CVE-2008-3639, CVE-2008-3640, CVE-2008-3641, DSA-1656-1, FEDORA-2008-8801, FEDORA-2008-8844, MDVSA-2008:211, RHSA-2008:0937-01, RHSA-2009:0308-01, SSA:2008-312-01, SUSE-SR:2009:002, TLSA-2008-43, VIGILANCE-VUL-8159, ZDI-08-067
ClamAV: several vulnerabilities
An attacker can use several vulnerabilities of ClamAV in order to create a denial of service or to execute code on the server...
BID-32207, CERTA-2002-AVI-217, CVE-2008-5050, DSA-1680-1, FEDORA-2008-9644, FEDORA-2008-9651, MDVSA-2008:229, SUSE-SR:2008:026, VIGILANCE-VUL-8217
Net-SNMP: denial of service via GETBULK
An attacker can create a denial of service by requesting numerous data with GETBULK...
262908, 6356589, 6839634, BID-32020, CERTA-2008-AVI-540, CERTA-2010-AVI-620, CVE-2008-4309, DSA-1663-1, FEDORA-2008-10451, FEDORA-2008-9362, FEDORA-2008-9367, JSA10991, MDVSA-2008:225, RHSA-2008:0971-01, SSA:2008-320-02, SUSE-SR:2009:003, VIGILANCE-VUL-8212, VMSA-2009-0001, VMSA-2009-0001.1, VMSA-2009-0003
OpenOffice: code execution via WMF/EMF
Two vulnerabilities of OpenOffice.org can be used by an attacker to execute code on computer of victims opening a malicious WMF/EMF document...
242627, 243226, 6749452, 6751941, BID-31962, CERTA-2008-AVI-530, CVE-2008-2237, CVE-2008-2238, DSA-1661-1, FEDORA-2008-9313, FEDORA-2008-9333, MDVSA-2009:006, RHSA-2008:0939-00, SUSE-SR:2008:026, VIGILANCE-VUL-8208
Linux kernel: privilege elevation via ftruncate
A local attacker can create a sgid file in order to obtain privileges of a group...
BID-31368, CERTA-2002-AVI-192, CVE-2008-4210, DSA-1653-1, MDVSA-2008:220, MDVSA-2008:220-1, RHSA-2008:0957-02, RHSA-2008:0972-01, RHSA-2008:0973-03, RHSA-2009:0001-01, SUSE-SA:2008:051, SUSE-SA:2008:056, SUSE-SA:2008:057, SUSE-SR:2008:025, SUSE-SU-2011:0928-1, VIGILANCE-VUL-8132, VMSA-2009-0014, VMSA-2009-0014.1, VMSA-2009-0014.2
GNU Enscript: buffer overflow via escape font
An attacker can invite the victim to convert a malicious file with GNU Enscript in order to execute code on his computer...
BID-31858, CERTA-2002-AVI-207, CVE-2008-4306, DSA-1670-1, FEDORA-2008-9351, FEDORA-2008-9372, MDVSA-2008:243, RHSA-2008:1016-01, RHSA-2008:1021-02, VIGILANCE-VUL-8197
libspf2: buffer overflow via SPF
An attacker can use a malicious SPF field in order to execute code on messaging servers linked with libspf2...
BID-31881, CERTA-2002-AVI-192, CERTA-2008-AVI-526, CVE-2008-2469, DSA-1659-1, VIGILANCE-VUL-8192, VU#183657
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Woody: