CVE-2004-0587
https://notcve.org/view.php?id=CVE-2004-0587
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service. Permisos inseguros en el fichero /proc/scsi/qla2300/HbaApiNode en Linux permite a usuarios locales causar una denegación de servicio. • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://lwn.net/Articles/91155 http://securitytracker.com/id?1010057 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066 http://www.novell.com/linux/security/advisories/2004_10_kernel.html http://www.redhat.com/support/errata/RHSA-2004-413.html http://www.redhat.com/support/errata/RHSA-2004-418.html http://www.securityfocus.com/bid/10279 https://exchange.xforce.ibmcloud.com/vulnerab •
CVE-2004-0554 – Linux Kernel 2.4.x/2.6.x - Assembler Inline Function Local Denial of Service
https://notcve.org/view.php?id=CVE-2004-0554
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. El kernel de Linux 2.4.2x y 2.6.x para x86 permite a usuarios locales causar una denegación de servicio (caída del sistema), posiblemente mediante un bucle infinito que dispara un manejador de señal con una cierta secuencia de instrucciones fsave y fstor, originalmente demostrado con el programa "crash.c". • https://www.exploit-db.com/exploits/306 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905 http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html http://lwn.net/Articles/91155 http://marc.info/?l=bugtraq&m=108786114032681&w=2 http://marc.info/?l=bugtraq&m=108793699910896&w=2 http://marc.info/? •
CVE-2004-0535
https://notcve.org/view.php?id=CVE-2004-0535
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. El controlador e1000 del kernel de Linux 2.4.26 y anteriores no inicializa la memoria antes de usarla, lo que permite a usuarios locales leer porciones de la memoria del kernel. NOTA: Este problema ha sido originalmente descrito incorrectamente por otras fuentes como un "desbordamiento de búfer". • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://lwn.net/Articles/91155 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log http://www.mandriva.com/security/advisories?name=MDKSA-2004:062 http://www.novell.com/linux/security/advisories/2004_20_kern •
CVE-2004-0064 – SuSE Linux 9.0 - YaST Configuration Skribt Overwrite Files
https://notcve.org/view.php?id=CVE-2004-0064
The SuSEconfig.gnome-filesystem script for YaST in SuSE 9.0 allows local users to overwrite arbitrary files via a symlink attack on files within the tmp.SuSEconfig.gnome-filesystem.$RANDOM temporary directory. El script SuSEconfig.gnome-filesystem de Yast de SuSE 9.0 permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en ficheros el el directorio temporal tmp.SuSEconfig.gnome-filesystem.$RANDOM. • https://www.exploit-db.com/exploits/144 http://marc.info/?l=bugtraq&m=107402658600437&w=2 http://secunia.com/advisories/10623 http://www.osvdb.org/3460 http://www.securityfocus.com/bid/9411 http://www.securitytracker.com/id?1008703 •
CVE-2003-1295
https://notcve.org/view.php?id=CVE-2003-1295
Unspecified vulnerability in xscreensaver 4.12, and possibly other versions, allows attackers to cause xscreensaver to crash via unspecified vectors "while verifying the user-password." • http://www.novell.com/linux/download/updates/90_i386.html http://www.securityfocus.com/bid/9125 •