ID CVE-2007-5079
Summary Red Hat Enterprise Linux 4 does not properly compile and link gdm with tcp_wrappers on x86_64 platforms, which might allow remote attackers to bypass intended access restrictions.
References
Vulnerable Configurations
  • cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*
CVSS
Base: 6.0 (as of 29-07-2017 - 01:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:S/C:P/I:P/A:P
redhat via4
advisories
bugzilla
id 625818
title gdm/ cannot shutdown system
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304025
    • comment gdm is earlier than 1:2.6.0.5-7.rhel4.19.el4_8.2
      oval oval:com.redhat.rhsa:tst:20100657001
    • comment gdm is signed with Red Hat master key
      oval oval:com.redhat.rhsa:tst:20070286002
rhsa
id RHSA-2010:0657
released 2010-08-26
severity Low
title RHSA-2010:0657: gdm security and bug fix update (Low)
rpms
  • gdm-1:2.6.0.5-7.rhel4.19.el4_8.2
  • gdm-debuginfo-1:2.6.0.5-7.rhel4.19.el4_8.2
refmap via4
confirm https://bugzilla.redhat.com/show_bug.cgi?id=181302
xf rhel-tcpwrapper-security-bypass(36791)
statements via4
contributor Joshua Bressers
lastmodified 2010-08-26
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181302 An update has been released which resolves this issue: http://rhn.redhat.com/errata/RHSA-2010-0657.html
Last major update 29-07-2017 - 01:33
Published 25-09-2007 - 01:17
Last modified 29-07-2017 - 01:33
Back to Top