Warning message

Log in to add comments.

Red Hat's Most Serious Flaw Types for 2010

Mark J. Cox published on 2011-08-09T00:00:00+00:00, last updated 2016-06-20T18:38:35+00:00

A few weeks ago the 2011 update to the CWE/SANS Top 25 Most Dangerous Software Errors was published. As part of our contribution to this update we analysed the most severe vulnerabilities that affected Red Hat since the last update and mapped each one to the appropriate Common Weakness Enumeration (CWE) type.

The table below lists all vulnerabilities which have a CVSS score of 7 or more ('high'), that we fixed in any product during calendar year 2010.

Most common CWE were:

  • Buffer Copy without Checking Size of Input (CWE-120): 8 vulnerabilities.
  • Race Condition (CWE-362): 5 vulnerabilities.

CVE CWE 2011 top 25? CVSS base score Fixed in
CVE-2007-4567 CWE-476 no 7.8 Red Hat Enterprise Linux 5 (kernel)
CVE-2009-0778 CWE-770 no 7.1 Red Hat Enterprise Linux 5 (kernel)
CVE-2009-1385 CWE-191 no 7.1 Red Hat Enterprise Linux 5 (kernel)
CVE-2009-3080 CWE-129 no 7.2 Red Hat Enterprise Linux 3, 4, 5, MRG (kernel)
CVE-2009-3245 CWE-252 no 7.6 Red Hat Enterprise Linux 3, 4, 5 (openssl)
CVE-2009-3726 CWE-476 no 7.2 Red Hat Enterprise Linux 4, 5, MRG (kernel)
CVE-2009-4005 CWE-127 no 7.1 Red Hat Enterprise Linux 4 (kernel)
CVE-2009-4027 CWE-362 no 7.8 Red Hat Enterprise Linux 5 (kernel)
CVE-2009-4141 CWE-416 no 7.2 Red Hat Enterprise Linux 5, MRG (kernel)
CVE-2009-4212 CWE-191 no 10.0 Red Hat Enterprise Linux 3, 4, 5 (krb5)
CVE-2009-4272 CWE-764 no 7.8 Red Hat Enterprise Linux 5 (kernel)
CVE-2009-4273 CWE-78 yes 7.9 Red Hat Enterprise Linux 5 (systemtap)
CVE-2009-4537 CWE-120 yes 7.1 Red Hat Enterprise Linux 4, 5, MRG (kernel)
CVE-2009-4895 CWE-362 no 7.2 Red Hat Enterprise MRG (kernel)
CVE-2010-0008 CWE-606 no 7.8 Red Hat Enterprise Linux 4, 5 (kernel)
CVE-2010-0291 CWE-822 no 7.2 Red Hat Enterprise Linux 5 (kernel)
CVE-2010-0738 CWE-424 no 7.5 JBoss Enterprise Application Platform 4.2, 4.3
CVE-2010-0741 CWE-20 no 7.1 Red Hat Enterprise Linux 5 (kvm)
CVE-2010-1084 CWE-120 yes 7.2 Red Hat Enterprise Linux 5 (kernel)
CVE-2010-1086 CWE-20 no 7.8 Red Hat Enterprise Linux 4, 5 (kernel)
CVE-2010-1087 CWE-362 no 7.2 Red Hat Enterprise Linux 5 (kernel)
CVE-2010-1166 CWE-823 no 7.6 Red Hat Enterprise Linux 5 (xorg-x11-server)
CVE-2010-1173 CWE-120 * yes 7.1 Red Hat Enterprise Linux 4, 5 (kernel)
CVE-2010-1188 CWE-416 no 7.8 Red Hat Enterprise Linux 3, 4, 5 (kernel)
CVE-2010-1436 CWE-120 yes 7.2 Red Hat Enterprise Linux 5 (kernel)
CVE-2010-1437 CWE-362 no 7.2 Red Hat Enterprise Linux 4, 5 (kernel)
CVE-2010-2063 CWE-823 no 7.5 Red Hat Enterprise Linux 3, 4, 5 (samba)
CVE-2010-2235 CWE-77 no 7.1 Red Hat Network Satellite Server 5.3 (cobbler)
CVE-2010-2240 CWE-788 no 7.2 Red Hat Enterprise Linux 3, 4, 5, MRG (kernel)
CVE-2010-2248 CWE-682 no 7.1 Red Hat Enterprise Linux 4, 5 (kernel)
CVE-2010-2492 CWE-805 no 7.2 Red Hat Enterprise Linux 5, 6 (kernel)
CVE-2010-2521 CWE-805 no 8.3 Red Hat Enterprise Linux 4, 5, MRG (kernel)
CVE-2010-2798 CWE-476 no 7.2 Red Hat Enterprise Linux 5 (kernel)
CVE-2010-2962 CWE-823 no 7.2 Red Hat Enterprise Linux 6, MRG (kernel)
CVE-2010-3069 CWE-129 no 8.3 Red Hat Enterprise Linux 3, 4, 5, 6 (samba)
CVE-2010-3081 CWE-131 yes 7.2 Red Hat Enterprise Linux 3, 4, 5, 6, MRG (kernel)
CVE-2010-3084 CWE-120 yes 7.2 Red Hat Enterprise Linux 6 (kernel)
CVE-2010-3301 CWE-129 no 7.2 Red Hat Enterprise Linux 6 (kernel)
CVE-2010-3302 CWE-120 yes 7.1 Red Hat Enterprise Linux 6 (openswan)
CVE-2010-3308 CWE-120 yes 7.1 Red Hat Enterprise Linux 6 (openswan)
CVE-2010-3432 CWE-805 * no 7.8 Red Hat Enterprise Linux 4, 5, 6, MRG (kernel)
CVE-2010-3705 CWE-788 no 8.3 Red Hat Enterprise Linux 6, MRG (kernel)
CVE-2010-3708 CWE-77 no 7.5 JBoss Enterprise Application Platform 4.3, SOA Platform 4.2
CVE-2010-3752 CWE-78 yes 7.1 Red Hat Enterprise Linux 6 (openswan)
CVE-2010-3753 CWE-78 yes 7.1 Red Hat Enterprise Linux 6 (openswan)
CVE-2010-3847 CWE-426 no 7.2 Red Hat Enterprise Linux 5, 6 (glibc)
CVE-2010-3856 CWE-426 no 7.2 Red Hat Enterprise Linux 5, 6 (glibc)
CVE-2010-3864 CWE-362 no 7.6 Red Hat Enterprise Linux 6 (openssl)
CVE-2010-3904 CWE-822 no 7.2 Red Hat Enterprise Linux 5, 6 (kernel)
CVE-2010-4170 CWE-88 no 7.2 Red Hat Enterprise Linux 4, 5, 6 (systemtap)
CVE-2010-4179 CWE-862 yes 7.5 Red Hat Enterprise MRG (cumin)
CVE-2010-4344 CWE-120 yes 7.5 Red Hat Enterprise Linux 4, 5 (exim)

* in both these cases the outcome is not a buffer overflow as the possible overflow is detected and instead converted into an abort (DoS)

English

About The Author

Mark J. Cox's picture Red Hat Community Member 25 points

Mark J. Cox

Mark J Cox lives in Scotland and for 2000 to 2018 was the Senior Director of Product Security at Red Hat. Mark has developed software and worked on the security teams of popular open source projects including Apache and OpenSSL. Mark is a founding member of the Apache Software Foundation and the Ope...