CVE-2005-0605 – libxpm buffer overflow
https://notcve.org/view.php?id=CVE-2005-0605
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U http://bugs.gentoo.org/show_bug.cgi?id=83598 http://bugs.gentoo.org/show_bug.cgi?id=83655 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://secunia.c •
CVE-2005-0090
https://notcve.org/view.php?id=CVE-2005-0090
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20618 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10425 https://access.redhat.com/security/cve/CVE-2005-0090 https://bugzilla.redhat.com/show_bug.cgi?id=1617452 •
CVE-2005-0091
https://notcve.org/view.php?id=CVE-2005-0091
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls. • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20619 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11249 https://access.redhat.com/security/cve/CVE-2005-0091 https://bugzilla.redhat.com/show_bug.cgi?id=1617453 •
CVE-2005-0472
https://notcve.org/view.php?id=CVE-2005-0472
Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=10 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.debian.org/security/2005/dsa-716 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/839280 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_ •
CVE-2005-0092
https://notcve.org/view.php?id=CVE-2005-0092
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20620 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11647 https://access.redhat.com/security/cve/CVE-2005-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1617454 •