Page 265 of 3121 results (0.017 seconds)

CVSS: 10.0EPSS: 0%CPEs: 3EXPL: 0

12 Jan 2010 — drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537. drivers/net/e1000e/netdev.c en el driver e1000e en el kernel de Linux v2.6.32.3 y anteriores no comprueba adecuadamente el tamaño de una trama Ethernet que excede el MTU, lo que permite a atacantes remotos conseguir un impacto desc... • http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html •

CVSS: 9.1EPSS: 1%CPEs: 3EXPL: 0

12 Jan 2010 — drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. drivers/net/e1000/e1000_main.c en el driver e1000 en el kernel de Linux v2.6.32.3 y anteriores gestiona tramas Ethernet que... • http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups • CWE-189: Numeric Errors •

CVSS: 7.8EPSS: 4%CPEs: 2EXPL: 0

12 Jan 2010 — drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containi... • http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 338EXPL: 0

16 Dec 2009 — drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field. drivers/firewire/ohci.c en el kernel de Linux anterior a v2.6.32-git9, cuando se usa el modo packet-per-buffer, permite a usuarios locales provocar una denegación de se... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8c0c0cc2d9f4c523fde04bdfe41e4380dec8ee54 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 340EXPL: 0

13 Dec 2009 — Unspecified vulnerability in the EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel 2.6.32-git6 and earlier allows local users to cause a denial of service (filesystem corruption) via unknown vectors, a different vulnerability than CVE-2009-4131. Vulnerabilidad sin especificar en la implementación EXT4_IOC_MOVE_EXT (también conocido como "move extents") ioctl en el sistema de ficheros ext4 en el kernel de Linux v2.6.32-git6 y anteriores permite a usuarios lo... • http://grsecurity.org/test/grsecurity-2.1.14-2.6.32-200912112157.patch •

CVSS: 7.8EPSS: 3%CPEs: 331EXPL: 0

13 Dec 2009 — The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal. La funcion ext4_decode_error en fs/ext4/super.c en el sistema de ficheros ext4 en el kernel de Linux anteriores a v2.6.32 permite a atacantes remotos asistidos por el usuario producir una denegación de servici... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78f1ddbb498283c2445c11b0dfa666424c301803 • CWE-399: Resource Management Errors CWE-476: NULL Pointer Dereference •

CVSS: 7.1EPSS: 2%CPEs: 332EXPL: 1

13 Dec 2009 — The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value). La funcion ext4_fill_flex_info en fs/ext4/super.c en el kernel de Linux anteriores a v2.6.32-git6 permite a atacantes remotos asistidos por el usuario producir una denegación de servicio (error de ... • http://bugzilla.kernel.org/show_bug.cgi?id=14287 • CWE-189: Numeric Errors •

CVSS: 7.2EPSS: 0%CPEs: 340EXPL: 1

13 Dec 2009 — The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions. La implementación ioctl EXT4_IOC_MOVE_EXT (tambien conocido como move extents) en el sistema de ficheros ext4 en el kernel de Linux en versiones anteriores a v2.6.32-git6 permite a usuarios locales sobrescribir ficheros arbitrariamente a través de peticiones manip... • https://www.exploit-db.com/exploits/33395 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 11%CPEs: 68EXPL: 0

08 Dec 2009 — The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function. La función ip_frag_reasm en el archivo net/ipv4/ip_fragment.c en el kernel de Linux versiones 2.6.32-rc8, y 2.6.29 y versiones posteriores anteriores a 2.6.32, llama a IP_I... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bbf31bf18d34caa87dd01f08bf713635593697f2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 3%CPEs: 335EXPL: 0

02 Dec 2009 — The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch." El subsistema mac80211 en el kernel de linux anterior a 2.6.32-rc8-next-20091201, permite a atacantes remotos provocar una denegación de servicio (panic) a través de un un Delete Block ACK (también conocido como DELBA) manipulado. Relacionado con un "code shuffling patch" erró... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=827d42c9ac91ddd728e4f4a31fefb906ef2ceff7 •