Classification of Red Hat security alerts 2003

This is a list of vulnerabilities release in 2003, with an attempt to classify them into if they would have been avoided if the code had used a real dynamic string API and to classify them into a Vulnerability range (ie. Can you only exploit it from the local machine or can you do it remotely). However note that esp. in the later classifications it's possible that my classification is wrong for your environment (for instance if you don't pass untrusted data from the network to unzip, that is a local vulnerability, if you only allow connections from the local machine to postgresql that becomes a local vulnerability, if you download arbitrary themes from the network and load them into WindowMaker that becomes a remote vulnerability or if you run commands over untrusted NFS mounts then most filesystem vulnerabilities can become remote vulnerabilities). I've tried to classify each with the most commmonly expected value.

A RED error indicates an error that could not have occured if the program had been using a real dynamic string API.

A BLUE error indicates an error that could not have occured it the program had been using Vstr.

You can go straight to the summary of the types of the vulnerabilities or to the summary of the range of the vulnerabilities.
Red Hat PackageTypes of VulnerabilityRange of VulnerabilityRange, if Vstr was usedRange, if any dynamic string API was used
MySQLBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
sanePrivilage Escalation (First connection after starting isn't checked)
Denial of Service (read of memory after allocation)
Denial of Service (random amount of memory is attempted for allocation)
Denial of Service (when debug printing, non-NIL terminated strings are assumed NIL terminated)
Denial of Service (unbounded allocation)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
perlInput Validation (Redefining @_)
Cross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
opensslInput Validation (ASN.1 tag parsing)
Double Free
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
perlPrivilage Escalation (can break out of safe.pm sandboxes)
Cross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
apache httpdInput Validation (Cipher restrictions ignored on renegotiation)
Denial of Service (infinite loop handling internal redirects and nested subrequests)
Denial of Service (temporarily, if using multiple ports)
Denial of Service (ftp proxy and IPV6 only)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
opensshInteger Overflow
Remote vulnerabilityNot applicableNot applicable
sendmailBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
KDEPrivilage Escalation (bad session credentials)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
opensshInteger Overflow
Remote vulnerabilityNot applicableNot applicable
pineBuffer Overflow
Integer Overflow
Remote vulnerabilityNot applicableNot applicable
gtkhtmlDenial of Service (NULL pointer de-reference)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
apache httpdInput Validation (Cipher restrictions ignored on renegotiation)
Denial of Service (infinite loop handling internal redirects and nested subrequests)
Denial of Service (temporarily, if using multiple ports)
Denial of Service (ftp proxy and IPV6 only)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
up2dateBroken Packaging (Expired Certificate Authority)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
sendmailFree uninitialized memory location
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
pam_smbBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
iptablesBroken Packaging (bad dependancies cause kernel updates to stop iptables firewall)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
GDMPrivilage Escalation (read files)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
KDEInformation Leak
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
ddskkTemporary File Creation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
up2dateInput Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
postfixInput Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
unzipInput Validation
Possibly remote vulnerabilityPossibly remote vulnerabilityPossibly remote vulnerability
XtermInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
phpCross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
etherealBuffer Overflow
Integer Overflow
Off By One
Remote vulnerabilityNot applicableNot applicable
nfs-utilsBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
mozillaBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
XpdfInput Validation
Cross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
kernelInformation Leak
Privilage Escalation (read files)
Privilage Escalation (UDP port binding)
Input Validation
Possibly remote vulnerabilityPossibly remote vulnerabilityPossibly remote vulnerability
semiInput Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
stunnelDenial of Service (Signal handling code)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
OpenSSHInformation Leak
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
wu-ftpdOff By One
Remote vulnerabilityNot applicableNot applicable
kernelDenial of Service (Crash)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
kon2Buffer Overflow
Remote vulnerabilityNot applicableNot applicable
KDEMan in the Middle
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
hantermInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
ypservDenial of Service (Blocking write)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
manInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
mod_auth_anyImproper Encoding (shell callout)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
KDEImproper Encoding (shell callout)
Input Validation (Run postscript as user)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
xinetdDenial of Service (Memory leak)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
kernelDenial of Service (CPU)
Privilage Escalation (I/O ports)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
tcpdumpPrivilage Escalation (failure to drop privileges and looks at the network)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
lvPrivilage Escalation (Run commands as other users)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
gnupgInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
CUPSDenial of Service (Blocking read)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
apache httpdFree memory that is in use
Remote vulnerabilityNot applicableRemote vulnerability
ghostscriptInput Validation
Possibly remote vulnerabilityPossibly remote vulnerabilityPossibly remote vulnerability
OpenSSLInformation Leak
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
vsftpdBroken Packaging (disabled hosts.allow/hosts.deny)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
kerberosAuthenticated Privilage Escalation (leverage auth. in one relm to gain auth. in another)
Integer Overflow
Remote vulnerabilityLocal vulnerabilityLocal vulnerability
eogBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
NetPBMBuffer Overflow
Integer Overflow
Possibly remote vulnerabilityNot applicableNot applicable
muttBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
balsaBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
sambaBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
mgettyBuffer Overflow
Possibly remote vulnerabilityNot applicableNot applicable
kernelPrivilage Escalation (ptrace)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
apache httpdDenial of Service (Memory leak)
Input Validation
Improper Encoding (Corrupted log files)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
tcpdumpBuffer Overflow
Input Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
etherealBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
squirrelmailCross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
LPRngTemporary File Creation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
mICQInput Validation
Remote vulnerabilityNot applicableRemote vulnerability
zlibBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
MySQLDouble Free
Input Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
sendmailBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
squirrelmailCross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
imTemporary File Creation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
OpenSSLInformation Leak
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
fileBuffer Overflow
Local vulnerabilityNot applicableNot applicable
Gnome-lokkitInput Validation (Doesn't do anything for FORWARD rule packets)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
rxvtInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
kernelPrivilage Escalation (ptrace)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
sambaBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
glibc (sun rpc code)Integer Overflow
Remote vulnerabilityNot applicableNot applicable
kernelPrivilage Escalation (module loading)
Information Leak
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
evolutionInput Validation
Remote vulnerabilityNot applicableRemote vulnerability
kerberosInteger Overflow
Input Validation
Input Validation
Input Validation (Vulnerabilities in the support for triple-DES keys)
Authenticated Privilage Escalation (leverage auth. in one relm to gain auth. in another)
Integer Overflow
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
sendmailBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
dhcpDenial of Service (sends data constantly to the broadcast address)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
phpBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
openldapBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
WindowMakerBuffer Overflow
Local vulnerabilityNot applicableNot applicable
XpdfInteger Overflow
Remote vulnerabilityNot applicableNot applicable
w3mCross Site Scripting
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
kernel-utilsBroken Packaging (unsafe program was setuid)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
lynxInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
pam_xauthInformation Leak
Local vulnerabilityLocal vulnerabilityLocal vulnerability
fileutilsPrivilage Escalation (delete other users files)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
shadow-utilsPrivilage Escalation (read/write other users incoming mailbox)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
VNCInput Validation (Replay authorization)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
vteInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
pineBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
cyrus-saslBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
libpngBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
CUPSBuffer Overflow
Integer Overflow
Temporary File Creation
Input Validation
Cross Site Scripting
Denial of Service (attack recovery)
Remote vulnerabilityRemote vulnerabilityRemote vulnerability
postgresqlBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
postgresqlPrivilage Escalation (delete transaction log files)
Buffer Overflow
Remote vulnerabilityLocal vulnerabilityLocal vulnerability
MySQLInteger Overflow
Input Validation
Buffer Overflow
Remote vulnerabilityPossibly remote vulnerabilityPossibly remote vulnerability
dhcpBuffer Overflow
Remote vulnerabilityNot applicableNot applicable
vimInput Validation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
cvsPrivilage Escalation (write to any files)
Local vulnerabilityLocal vulnerabilityLocal vulnerability
pythonTemporary File Creation
Local vulnerabilityLocal vulnerabilityLocal vulnerability
kerberosInput Validation
Remote vulnerabilityRemote vulnerabilityRemote vulnerability

Summary of types of vulnerabilities

Type of Vulnerability Number of Vulnerabilities
Buffer Overflow
32
Input Validation
30
Denial of Service (All)
20
Privilage Escalation (All)
16
Integer Overflow
12
Cross Site Scripting
8
Information Leak
7
Temporary File Creation
5
Broken Packaging (All)
4
Input Validation
3
Improper Encoding (All)
3
Double Free
2
Off By One
2
Authenticated Privilage Escalation (All)
2
Free uninitialized memory location
1
Free memory that is in use
1
Man in the Middle
1

Summary of range of vulnerabilities

What happened

Range of Vulnerability Number of Vulnerabilities
Remote vulnerabilities75
Possible remote vulnerabilities5
Local vulnerabilities27
All Vulnerabilities107

What would have happened if all the packages had used a dynamic string API

Range of Vulnerability Number of Vulnerabilities
Remote vulnerabilities43 (57%)
Possible remote vulnerabilities4 (80%)
Local vulnerabilities27 (100%)
All Vulnerabilities74 (69%)

What would have happened if all the packages had used Vstr

Range of Vulnerability Number of Vulnerabilities
Remote vulnerabilities40 (53%)
Possible remote vulnerabilities4 (80%)
Local vulnerabilities27 (100%)
All Vulnerabilities71 (66%)