From 4c14e5ed7e880efac89d806e602a22fff9520a6e Mon Sep 17 00:00:00 2001 From: Jess Frazelle Date: Sun, 12 Feb 2017 19:14:51 -0800 Subject: [PATCH] update readme Signed-off-by: Jess Frazelle --- README.md | 100 ------------------------------------------------------ 1 file changed, 100 deletions(-) diff --git a/README.md b/README.md index bcc7b72c..cd7cdf7c 100644 --- a/README.md +++ b/README.md @@ -74,106 +74,6 @@ GLOBAL OPTIONS: ```console $ $ reg vulns --clair https://clair.j3ss.co chrome Found 32 vulnerabilities -CVE-2016-2781: [Unknown] -chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. -https://security-tracker.debian.org/tracker/CVE-2016-2781 ------------------------------------------ -CVE-2016-10095: [Unknown] - -https://security-tracker.debian.org/tracker/CVE-2016-10095 ------------------------------------------ -CVE-2007-5686: [Negligible] -initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts. NOTE: because sshd detects the insecure permissions and does not log certain events, this also prevents sshd from logging failed authentication attempts by remote attackers. -https://security-tracker.debian.org/tracker/CVE-2007-5686 ------------------------------------------ -CVE-2016-6251: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2016-6251 ------------------------------------------ -CVE-2013-4235: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2013-4235 ------------------------------------------ -CVE-2005-2541: [Negligible] -Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges. -https://security-tracker.debian.org/tracker/CVE-2005-2541 ------------------------------------------ -CVE-2010-4756: [Negligible] -The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632. -https://security-tracker.debian.org/tracker/CVE-2010-4756 ------------------------------------------ -CVE-2010-4051: [Negligible] -The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow." -https://security-tracker.debian.org/tracker/CVE-2010-4051 ------------------------------------------ -CVE-2010-4052: [Negligible] -Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD. -https://security-tracker.debian.org/tracker/CVE-2010-4052 ------------------------------------------ -CVE-2017-5932: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2017-5932 ------------------------------------------ -CVE-2011-3374: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2011-3374 ------------------------------------------ -CVE-2013-0340: [Negligible] -expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE. -https://security-tracker.debian.org/tracker/CVE-2013-0340 ------------------------------------------ -CVE-2007-6755: [Negligible] -The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE. -https://security-tracker.debian.org/tracker/CVE-2007-6755 ------------------------------------------ -CVE-2010-0928: [Negligible] -OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack." -https://security-tracker.debian.org/tracker/CVE-2010-0928 ------------------------------------------ -CVE-2012-3878: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2012-3878 ------------------------------------------ -CVE-2011-4116: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2011-4116 ------------------------------------------ -CVE-2017-5563: [Negligible] -LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff. -https://security-tracker.debian.org/tracker/CVE-2017-5563 ------------------------------------------ -CVE-2014-8130: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2014-8130 ------------------------------------------ -CVE-2013-4392: [Negligible] -systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files. -https://security-tracker.debian.org/tracker/CVE-2013-4392 ------------------------------------------ -CVE-2012-0039: [Negligible] -** DISPUTED ** GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application. -https://security-tracker.debian.org/tracker/CVE-2012-0039 ------------------------------------------ -CVE-2015-3276: [Negligible] -The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors. -https://security-tracker.debian.org/tracker/CVE-2015-3276 ------------------------------------------ -CVE-2014-8166: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2014-8166 ------------------------------------------ -CVE-2004-0971: [Negligible] -The krb5-send-pr script in the kerberos5 (krb5) package in Trustix Secure Linux 1.5 through 2.1, and possibly other operating systems, allows local users to overwrite files via a symlink attack on temporary files. -https://security-tracker.debian.org/tracker/CVE-2004-0971 ------------------------------------------ -CVE-2011-3374: [Negligible] - -https://security-tracker.debian.org/tracker/CVE-2011-3374 ------------------------------------------ -CVE-2016-2779: [Negligible] -runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. -https://security-tracker.debian.org/tracker/CVE-2016-2779 ------------------------------------------ CVE-2015-5180: [Low] https://security-tracker.debian.org/tracker/CVE-2015-5180