4 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code. Linux vserver versiones 2.6 anteriores a 2.6.17, sufre de escalada de privilegios en el código remount. • https://security-tracker.debian.org/tracker/CVE-2006-4243 • CWE-269: Improper Privilege Management •

CVSS: 6.2EPSS: 0%CPEs: 280EXPL: 0

Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647 https://access.redhat.com/security/cve/CVE-2005-0178 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 3.6EPSS: 0%CPEs: 19EXPL: 0

Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server. • http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html http://linux-vserver.org/ChangeLog http://secunia.com/advisories/12021 http://securitytracker.com/id?1010643 http://www.osvdb.org/7480 http://www.securityfocus.com/bid/10660 https://exchange.xforce.ibmcloud.com/vulnerabilities/16626 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 2

Linux-VServer 1.24 allows local users with root privileges on a virtual server to gain access to the filesystem outside the virtual server via a modified chroot-again exploit using the chmod command. • https://www.exploit-db.com/exploits/23658 http://secunia.com/advisories/10816 http://www.linux-vserver.org/index.php?page=ChangeLog http://www.osvdb.org/3875 http://www.securityfocus.com/archive/1/353003 http://www.securityfocus.com/bid/9596 https://exchange.xforce.ibmcloud.com/vulnerabilities/15073 •