The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Woody

Linux kernel: denial of service on x86_64
A local attacker can use ptrace on a x86_64 processor in order to stop the system...
431430, BID-29086, CVE-2008-1615, DSA-1588-1, DSA-1588-2, FEDORA-2008-4043, MDVSA-2008:167, MDVSA-2008:174, RHSA-2008:0237-01, RHSA-2008:0275-01, RHSA-2008:0585-01, RHSA-2008:0849-5, SUSE-SA:2008:030, SUSE-SA:2008:031, SUSE-SA:2008:032, SUSE-SA:2008:035, SUSE-SA:2008:038, SUSE-SU-2011:0928-1, VIGILANCE-VUL-7850
libxslt: memory corruption via template match
An attacker can create a malicious XSL style sheet in order to create a denial of service or to execute code in applications linked to libxslt...
446809, 527297, BID-29312, CERTA-2008-AVI-282, CVE-2008-1767, DSA-1589-1, MDVSA-2008:151, RHSA-2008:0287-01, SSA:2008-210-03, SUSE-SR:2008:013, VIGILANCE-VUL-7841
GnuTLS: several vulnerabilities
An attacker can use several GnuTLS vulnerabilities in order to create a denial of service and possibly to execute code...
BID-29292, CERTA-2008-AVI-262, CVE-2008-1948, CVE-2008-1949, CVE-2008-1950, DSA-1581-1, FEDORA-2008-4183, FEDORA-2008-4259, FEDORA-2008-4274, FICORA #130447, GNUTLS-SA-2008-1-1, GNUTLS-SA-2008-1-2, GNUTLS-SA-2008-1-3, MDVSA-2008:106, RHSA-2008:0489-01, RHSA-2008:0492-01, SSA:2008-180-01, SUSE-SA:2008:046, VIGILANCE-VUL-7840, VU#111034, VU#252626, VU#659209
MTR: buffer overflow of split_redraw
A local or remote attacker can create an overflow in MTR in order to execute code...
BID-29290, CVE-2008-2357, DSA-1587-1, MDVSA-2008:176, SSA:2008-210-06, SUSE-SR:2008:014, VIGILANCE-VUL-7839
Nagios: Cross Site Scripting of CGI
An attacker can use a Cross Site Scripting of CGIs of Nagios...
BID-29140, CERTA-2008-AVI-265, CVE-2007-5803, DSA-1883-1, DSA-1883-2, MDVSA-2009:054, SUSE-SR:2008:011, VIGILANCE-VUL-7837
Linux kernel: denial of service via SIT
An attacker can use IPv6 packets in a SIT tunnel in order to progressively create a denial of service...
446031, BID-29235, CERTA-2008-AVI-252, CVE-2008-2136, DSA-1588-1, DSA-1588-2, FEDORA-2008-3873, FEDORA-2008-3949, MDVSA-2008:167, MDVSA-2008:174, RHSA-2008:0585-01, RHSA-2008:0607-01, RHSA-2008:0612-01, RHSA-2008:0787-01, RHSA-2008:0849-5, RHSA-2008:0973-03, RHSA-2009:0001-01, SUSE-SA:2008:030, SUSE-SA:2008:032, SUSE-SU-2011:0928-1, VIGILANCE-VUL-7831, VMSA-2009-0014, VMSA-2009-0014.1, VMSA-2009-0014.2
libvorbis: several vulnerabilities
Several vulnerabilities of libvorbis lead to a denial of service or to code execution when the victim opens an OGG audio file...
BID-29206, CERTA-2008-AVI-250, CERTA-2009-AVI-517, CVE-2008-1419, CVE-2008-1420, CVE-2008-1423, CVE-2008-2009, DSA-1591-1, FEDORA-2008-3898, FEDORA-2008-3910, FEDORA-2008-3934, MDVSA-2008:102, RHSA-2008:0270-01, RHSA-2008:0271-01, SUSE-SR:2008:012, VIGILANCE-VUL-7825
Debian: predictable openssl randoms
Keys generated by the openssl package of Debian 4.0 are predictable...
BID-29179, CERTA-2008-AVI-239, CERTA-2008-AVI-246, CVE-2008-0166, DSA-1571-1, DSA-1576-1, DSA-1576-2, VIGILANCE-VUL-7821, VU#925211
Nagios: Cross Site Scripting and memory leak
An attacker can use a Cross Site Scripting and a memory leak of Nagios...
BID-28250, CVE-2008-1360, DSA-1883-1, DSA-1883-2, MDVSA-2008:067, SUSE-SR:2008:011, VIGILANCE-VUL-7662
rdesktop: several vulnerabilities
An attacker can exploit several vulnerabilities of rdesktop in order to execute code...
BID-29097, CERTA-2008-AVI-239, CERTA-2008-AVI-322, CVE-2008-1801, CVE-2008-1802, CVE-2008-1803, DSA-1573-1, FEDORA-2008-3886, FEDORA-2008-3917, FEDORA-2008-3985, MDVSA-2008:101, RHSA-2008:0575-01, RHSA-2008:0576-01, RHSA-2008:0725-01, SSA:2008-148-01, VIGILANCE-VUL-7811
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Woody: