OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to c... oval:org.mitre.oval:def:9196 Vulnerability unix
The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows... oval:org.mitre.oval:def:9821 Vulnerability unix
The Distributed Lock Manager (DLM) in the cluster manager for Linux kernel 2.6.15 allows remote attackers to cause a den... oval:org.mitre.oval:def:9337 Vulnerability unix
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does ... oval:org.mitre.oval:def:9793 Vulnerability unix
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windo... oval:org.mitre.oval:def:9627 Vulnerability unix
The DNS server functionality should be enabled or disabled as appropriate. oval:gov.irs.sol10:def:44 Compliance unix
The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9... oval:org.mitre.oval:def:10414 Vulnerability unix
The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote atta... oval:org.mitre.oval:def:9731 Vulnerability unix
The dovecot package should not be installed oval:gov.irs.rhel5:def:296 Compliance unix
The dovecot package should not be installed oval:org.fedoraproject.f13:def:296 Compliance unix
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a... oval:org.mitre.oval:def:9779 Vulnerability unix
The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the ... oval:org.mitre.oval:def:10437 Vulnerability unix
The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, w... oval:org.mitre.oval:def:10797 Vulnerability unix
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, doe... oval:org.mitre.oval:def:10719 Vulnerability unix
The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count coun... oval:org.mitre.oval:def:10297 Vulnerability unix
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership o... oval:org.mitre.oval:def:9916 Vulnerability unix
The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before... oval:org.mitre.oval:def:11089 Vulnerability unix
The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, ... oval:org.mitre.oval:def:11509 Vulnerability unix
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not prop... oval:org.mitre.oval:def:11137 Vulnerability unix
The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which al... oval:org.mitre.oval:def:9399 Vulnerability unix
The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when runnin... oval:org.mitre.oval:def:10637 Vulnerability unix
The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have ... oval:org.mitre.oval:def:11142 Vulnerability unix
The drive_init function in QEMU 0.9.1 determines the format of a raw disk image based on the header, which allows local ... oval:org.mitre.oval:def:11021 Vulnerability unix
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users ... oval:org.mitre.oval:def:11196 Vulnerability unix
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to... oval:org.mitre.oval:def:9663 Vulnerability unix
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to... oval:org.mitre.oval:def:10740 Vulnerability unix
The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, ... oval:org.mitre.oval:def:10886 Vulnerability unix
The d_delete function in fs/ecryptfs/inode.c in eCryptfs in the Linux kernel 2.6.31 allows local users to cause a denial... oval:org.mitre.oval:def:10216 Vulnerability unix
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows l... oval:org.mitre.oval:def:11136 Vulnerability unix
The eay_check_x509cert function in KAME Racoon successfully verifies certificates even when OpenSSL validation fails, wh... oval:org.mitre.oval:def:9163 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html