Page 15 of 116 results (0.011 seconds)

CVSS: 2.1EPSS: 0%CPEs: 123EXPL: 1

The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality. La función open_exec en la funcionalidad execve (exec.c) en el kernel de Linux 2.4.x hasta 2.3.27, y 2.6.x hasta 2.6.8, permite a usuarios locales leer binarios ELF no legibles usando la funcionalidad de intérprete (PT_INTERP).. • https://www.exploit-db.com/exploits/624 http://secunia.com/advisories/18684 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt http: •

CVSS: 6.2EPSS: 0%CPEs: 79EXPL: 0

A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition. Un error de "falta de serialización" en la función unix_dgram_recvmsg en Linux 2.4.27 y anteriores, y 2.6.x hasta 2.6.9, permite a usurios locales ganar privilegios aprovechando una condición de carrera. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://marc.info/?l=bugtraq&m=110306397320336&w=2 http://secunia.com/advisories/19607 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security •

CVSS: 7.2EPSS: 0%CPEs: 123EXPL: 0

The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code. El cargador binfmt_elf (binfmt_elf.c) del kernel de Linux 2.4.x hasta 2.4.27, y 2.6.x a 2.6.8 puede crear una cadena de nombre de intérprete sin terminador nulo, lo que podría causarf que cadenas más largas que PATH_MAX sean usadas, conduciendo a desbordamientos de búfer que permiten a usuarios locales causar una denegación de servicio (cuelgue) y posiblemente ejecutar código arbitrario. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://secunia.com/advisories/19607 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.isec.pl/vulnerabilities/isec& •

CVSS: 6.4EPSS: 21%CPEs: 124EXPL: 0

Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function. Múltiples vulnerabilidades en el sistema de ficheros de samba (smbfs) en los kernel de Linux 2.4 y 2.6 permite a servidores samba remotos causar una denegación de servicio (caída) u obtener información sensible de la memoria del kernel mediante un servidor samba que devuelva más datos de los solicitados a la función smb_proc_read que devuelva un desplazamiento de datos de fuera del paquete samba a la función smb_proc_readX, que envíe una cierto paquete fragmentado TRANS2 a la función smb_receive_trans2, que envíe un paquete samba con un cierto tamaño de cabecera a la función smb_proc_readX, o que envíe un cierto desplazamiento basado en el paquete para los datos en un paquete a la función smb_receive_trans2 • http://marc.info/?l=bugtraq&m=110072140811965&w=2 http://marc.info/?l=bugtraq&m=110082989725345&w=2 http://secunia.com/advisories/13232 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://security.e-matters.de/advisories/142004.html http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1 •

CVSS: 6.4EPSS: 8%CPEs: 124EXPL: 0

The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times. La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de paquetes fragmentados, lo que podría permitir a servidores samba remotos: leer información del kernel de su elección aumentar un valor de un contador en un número arbitrario enviando la primera parte del paquete fragmentado varias veces. • http://marc.info/?l=bugtraq&m=110072140811965&w=2 http://secunia.com/advisories/13232 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://security.e-matters.de/advisories/142004.html http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 htt •