CVE-2005-0398
https://notcve.org/view.php?id=CVE-2005-0398
The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets. • http://secunia.com/advisories/14584 http://security.gentoo.org/glsa/glsa-200503-33.xml http://securitytracker.com/id?1013433 http://sourceforge.net/mailarchive/forum.php?thread_id=6787713&forum_id=32000 http://www.mandriva.com/security/advisories?name=MDKSA-2005:062 http://www.redhat.com/support/errata/RHSA-2005-232.html http://www.securityfocus.com/bid/12804 http://www.vupen.com/english/advisories/2005/0264 https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=109966&action=view •
CVE-2004-0497 – Linux Kernel < 2.6.7-rc3 (Slackware 9.1 / Debian 3.0) - 'sys_chown()' Group Ownership Alteration Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-0497
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4. Vulnerabilidad desconocida en el kernel 2.x de Linux puede permitir a usuarios locales modificar el ID de grupo de ficheros, como ficheros exportados con NFS en kernel 2.4. • https://www.exploit-db.com/exploits/718 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066 http://www.novell.com/linux/security/advisories/2004_20_kernel.html http://www.redhat.com/support/errata/RHSA-2004-354.html http://www.redhat.com/support/errata/RHSA-2004-360.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16599 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg. •
CVE-2004-0626
https://notcve.org/view.php?id=CVE-2004-0626
The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type. La función tcp_find_option del subsistema netfilter del kernel 2.6 de Linux, cuando se usan iptables y reglas de opciones TCP, permite a atacantes remotos causar una denegación de servicio (consumición de CPU por bucle infinito) mediante una opción de longitud larga que produce un entero negativo después de una conversión de tipos a char. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://lwn.net/Articles/91964 http://marc.info/?l=bugtraq&m=108861141304495&w=2 http://www.gentoo.org/security/en/glsa/glsa-200407-12.xml http://www.novell.com/linux/security/advisories/2004_20_kernel.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16554 •