3 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow. Desbordamiento de enteros en la función ubsec_keysetup del controlador de Linux Broadcom 5820 cryptonet permite a usuarios locales causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una variable add_dsa_buf_bytes negativa, lo que conduce a un desbordamiento de búfer. • http://marc.info/?l=bugtraq&m=108802653409053&w=2 http://secunia.com/advisories/11936 http://www.ciac.org/ciac/bulletins/p-047.shtml http://www.redhat.com/support/errata/RHSA-2004-549.html http://www.redhat.com/support/errata/RHSA-2005-283.html http://www.securityfocus.com/bid/10599 https://exchange.xforce.ibmcloud.com/vulnerabilities/16459 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9773 https://access.redhat.com/security/cve/CVE-2 •

CVSS: 7.2EPSS: 0%CPEs: 112EXPL: 3

The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985. La función do_remap en mremap de Linux 2.2 a 2.2.25, 2.4 a 2.4.24, y 2.6 a 2.6.2 no comprueba adecuadamente el valor devuelto por la función do_munmap cuando se excede el número máximo de descriptores VMA, lo que permite a usuarios locales ganar privilegios de root, una vulnerabilidad distinta de CAN-2004-0985. A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2. • https://www.exploit-db.com/exploits/160 https://www.exploit-db.com/exploits/154 http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0040.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820 http://fedoranews.org/updates/FEDORA-2004-079.shtml http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:015 http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt http://marc.info/?l=bugtraq&m=107711762014175&w=2 http://marc.info/?l=bugtraq&m=10771 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The C-Media PCI sound driver in Linux before 2.4.22 does not use the get_user function to access userspace in certain conditions, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0699. El controlador de sonido C-Media PCI para Linux anteriores a 2.4.22 no utliliza la función get_user para acceder al espacio de usuario en ciertas condiciones, lo cual cruza límites de seguridad y puede facilitar la explotación de vulnerabilidades, una vulnerabilidad diferente de CAN-2004-0699. • http://www.redhat.com/support/errata/RHSA-2003-238.html http://www.redhat.com/support/errata/RHSA-2004-044.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A401 https://access.redhat.com/security/cve/CVE-2003-0700 https://bugzilla.redhat.com/show_bug.cgi?id=1617073 •