Page 2 of 10 results (0.006 seconds)

CVSS: 2.1EPSS: 0%CPEs: 55EXPL: 1

Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. El kernel de Linux 2.4.2x y 2.6.x para x86 permite a usuarios locales causar una denegación de servicio (caída del sistema), posiblemente mediante un bucle infinito que dispara un manejador de señal con una cierta secuencia de instrucciones fsave y fstor, originalmente demostrado con el programa "crash.c". • https://www.exploit-db.com/exploits/306 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905 http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html http://lwn.net/Articles/91155 http://marc.info/?l=bugtraq&m=108786114032681&w=2 http://marc.info/?l=bugtraq&m=108793699910896&w=2 http://marc.info/? •

CVSS: 2.1EPSS: 0%CPEs: 93EXPL: 0

The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. El controlador e1000 del kernel de Linux 2.4.26 y anteriores no inicializa la memoria antes de usarla, lo que permite a usuarios locales leer porciones de la memoria del kernel. NOTA: Este problema ha sido originalmente descrito incorrectamente por otras fuentes como un "desbordamiento de búfer". • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://lwn.net/Articles/91155 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log http://www.mandriva.com/security/advisories?name=MDKSA-2004:062 http://www.novell.com/linux/security/advisories/2004_20_kern •

CVSS: 7.2EPSS: 0%CPEs: 30EXPL: 1

The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 http://marc.info/?l=bugtraq&m=94935300520617&w=2 •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 2

Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. • https://www.exploit-db.com/exploits/19096 ftp://patches.sgi.com/support/free/security/advisories/19981006-01-I http://www.ciac.org/ciac/bulletins/j-006.shtml http://www.securityfocus.com/bid/121 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 11%CPEs: 8EXPL: 1

Buffer overflow in University of Washington's implementation of IMAP and POP servers. • https://www.exploit-db.com/exploits/340 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042 •