Page 1026 of 5206 results (0.012 seconds)

CVSS: 2.1EPSS: 0%CPEs: 39EXPL: 0

The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key. • http://archives.neohapsis.com/archives/bugtraq/2002-01/0010.html http://www.securityfocus.com/bid/3775 https://exchange.xforce.ibmcloud.com/vulnerabilities/7769 •

CVSS: 5.0EPSS: 0%CPEs: 19EXPL: 0

The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux. La implementación de UDP en los kernels 2.4.x de Linux mantiene el campo de identificación de IP a 0 en todos los paquetes no fragmentados, lo que permite a atacantes remotos determinar que el sistema está ejecutando Linux. • http://www.iss.net/security_center/static/8588.php http://www.securityfocus.com/archive/1/262840 http://www.securityfocus.com/bid/4314 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and earlier does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote attackers to bypass intended firewall restrictions. El módulo de ayuda de seguimiento de conexión IRC en el subsistema netfilter en Linux 2.4.18-pre9 y anteriores no establece adecuadamente la máscara para 'conntrack' esperadas para conexiones DCC, lo que podría perimitir a atacantes remotos evitar las restriciones pretendidas en el cortafuegos. • http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:041 http://marc.info/?l=bugtraq&m=101483396412051&w=2 http://marc.info/?l=vuln-dev&m=101486352429653&w=2 http://www.kb.cert.org/vuls/id/230307 http://www.netfilter.org/security/2002-02-25-irc-dcc-mask.html http://www.redhat.com/support/errata/RHSA-2002-028.html http://www.securityfocus.com/bid/4188 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0203-027 https://exchange.xforce.ibmcl •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

Linux kernel, and possibly other operating systems, allows remote attackers to read portions of memory via a series of fragmented ICMP packets that generate an ICMP TTL Exceeded response, which includes portions of the memory in the response packet. El kernel de Linux, y posíblemente de otros sistemas operativos, permite a atacantes remotos leer porciones de memoria mediante una serie de paquetes ICMP fragmentados que generan una respuesta ICMP de TTL Excedido (time-to-live) , que incluye porciones de memoria en el paquete de respuesta. • http://www.osvdb.org/5394 http://www.redhat.com/support/errata/RHSA-2002-007.html http://www.securityfocus.com/archive/1/251418 https://exchange.xforce.ibmcloud.com/vulnerabilities/7998 https://access.redhat.com/security/cve/CVE-2002-0046 https://bugzilla.redhat.com/show_bug.cgi?id=1616728 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Linux kernel 2.2.19 enables CAP_SYS_RESOURCE for setuid processes, which allows local users to exceed disk quota restrictions during execution of setuid programs. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0179.html •