Total vulnerabilities in the database
Red Hat Enterprise Linux (RHEL) 5 ships the rpm for the Advanced Intrusion Detection Environment (AIDE) before 0.13.1 with a database that lacks checksum information, which allows context-dependent attackers to bypass file integrity checks and modify certain files.
Software | From | Fixed in |
---|---|---|
redhat / enterprise_linux | 5.0 | 5.0.x |