CVE-2001-0907 – Linux Kernel 2.2/2.4 - Deep Symbolic Link Denial of Service
https://notcve.org/view.php?id=CVE-2001-0907
Linux kernel 2.2.1 through 2.2.19, and 2.4.1 through 2.4.10, allows local users to cause a denial of service via a series of deeply nested symlinks, which causes the kernel to spend extra time when trying to access the link. • https://www.exploit-db.com/exploits/21122 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-036.0.txt http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-035-01 http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:079 http://marc.info/?l=bugtraq&m=100343090106914&w=2 http://marc.info/?l=bugtraq&m=100350685431610&w=2 http://www.iss.net/security_center/static/7312.php http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3 htt •
CVE-2001-1056
https://notcve.org/view.php?id=CVE-2001-1056
IRC DCC helper in the ip_masq_irc IP masquerading module 2.2 allows remote attackers to bypass intended firewall restrictions by causing the target system to send a "DCC SEND" request to a malicious server which listens on port 6667, which may cause the module to believe that the traffic is a valid request and allow the connection to the port specified in the DCC SEND request. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0733.html http://archives.neohapsis.com/archives/bugtraq/2001-07/0750.html http://www.iss.net/security_center/static/6923.php http://www.osvdb.org/1916 http://www.securityfocus.com/bid/3117 •
CVE-2001-1244 – HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service
https://notcve.org/view.php?id=CVE-2001-1244
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •
CVE-2001-0405 – Linux Kernel 2.4 - IPTables FTP Stateful Inspection Arbitrary Filter Rule Insertion
https://notcve.org/view.php?id=CVE-2001-0405
ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall. • https://www.exploit-db.com/exploits/20765 http://archives.neohapsis.com/archives/bugtraq/2001-04/0271.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-071.php3 http://www.redhat.com/support/errata/RHSA-2001-052.html http://www.redhat.com/support/errata/RHSA-2001-084.html http://www.securityfocus.com/bid/2602 https://exchange.xforce.ibmcloud.com/vulnerabilities/6390 https://access.redhat.com/security/cve/CVE-2001-0405 https://bugzilla.redhat.com/show_bug.cgi •
CVE-2001-0317 – Linux Kernel 2.2.18 (RedHat 6.2/7.0 / 2.2.14/2.2.18/2.2.18ow4) - ptrace/execve Race Condition Privilege Escalation
https://notcve.org/view.php?id=CVE-2001-0317
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process. • https://www.exploit-db.com/exploits/20720 https://www.exploit-db.com/exploits/20721 http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt http://www.redhat.com/support/errata/RHSA-2001-013.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6080 •