Page 143 of 726 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 123EXPL: 0

The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code. El cargador binfmt_elf (binfmt_elf.c) del kernel de Linux 2.4.x hasta 2.4.27, y 2.6.x a 2.6.8 puede crear una cadena de nombre de intérprete sin terminador nulo, lo que podría causarf que cadenas más largas que PATH_MAX sean usadas, conduciendo a desbordamientos de búfer que permiten a usuarios locales causar una denegación de servicio (cuelgue) y posiblemente ejecutar código arbitrario. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://secunia.com/advisories/19607 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.isec.pl/vulnerabilities/isec& •

CVSS: 6.4EPSS: 21%CPEs: 124EXPL: 0

Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function. Múltiples vulnerabilidades en el sistema de ficheros de samba (smbfs) en los kernel de Linux 2.4 y 2.6 permite a servidores samba remotos causar una denegación de servicio (caída) u obtener información sensible de la memoria del kernel mediante un servidor samba que devuelva más datos de los solicitados a la función smb_proc_read que devuelva un desplazamiento de datos de fuera del paquete samba a la función smb_proc_readX, que envíe una cierto paquete fragmentado TRANS2 a la función smb_receive_trans2, que envíe un paquete samba con un cierto tamaño de cabecera a la función smb_proc_readX, o que envíe un cierto desplazamiento basado en el paquete para los datos en un paquete a la función smb_receive_trans2 • http://marc.info/?l=bugtraq&m=110072140811965&w=2 http://marc.info/?l=bugtraq&m=110082989725345&w=2 http://secunia.com/advisories/13232 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://security.e-matters.de/advisories/142004.html http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1 •

CVSS: 6.4EPSS: 8%CPEs: 124EXPL: 0

The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times. La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de paquetes fragmentados, lo que podría permitir a servidores samba remotos: leer información del kernel de su elección aumentar un valor de un contador en un número arbitrario enviando la primera parte del paquete fragmentado varias veces. • http://marc.info/?l=bugtraq&m=110072140811965&w=2 http://secunia.com/advisories/13232 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://security.e-matters.de/advisories/142004.html http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 htt •

CVSS: 7.5EPSS: 1%CPEs: 52EXPL: 0

Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers. • http://rpmfind.net/linux/RPM/suse/updates/9.2/i386/rpm/i586/iptables-1.2.11-4.2.i586.html http://www.ciac.org/ciac/bulletins/p-026.shtml http://www.debian.org/security/2004/dsa-580 http://www.mandriva.com/security/advisories?name=MDKSA-2004:125 http://www.securityfocus.com/bid/11570 https://bugzilla.fedora.us/show_bug.cgi?id=2252 https://exchange.xforce.ibmcloud.com/vulnerabilities/17928 https://www.ubuntu.com/usn/usn-81-1 •

CVSS: 4.6EPSS: 0%CPEs: 206EXPL: 0

Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage. Ciertos controladores USB en el kernel de Linux 2.4 usa la función copy_to_user con structuras no inicializadas, lo que podría permitir a usuarios locales obtener información sensible leyendo memoria que no ha sido borrada desde el uso anterior. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.kb.cert& •