Page 280 of 3121 results (0.020 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

24 Sep 2007 — The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register. La funcionalidad de emulación de llamada del sistema IA32 en Linux kernel 2.4.x y 2.6.x versiones anteriores a 2.6.22.7, cuando se ejecuta en arquitecturas ... • https://www.exploit-db.com/exploits/30604 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 30EXPL: 0

14 Sep 2007 — The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges. El sistema de archivos CIFS en kernel de Linux versiones anteriores a 2.6.22, cuando el soporte de extensión Unix está habilitado, no respeta la umask de un proceso, lo que permite a usuarios locales alcanzar privilegios. • http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

14 Aug 2007 — Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG). El núcleo Linux 2.4.35 y otras versiones permite a usuarios locales enviar señales de su elección a un proceso hijo que está ejecutándose con privilegios mayores provocando que un proceso padre con setuid-root muera, lo cual envía desde u... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3848 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

13 Aug 2007 — The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 before 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for attackers to predict the output of the random number generator, related to incorrect use of the sizeof operator. La función xfer_secondary_pool en el archivo drivers/char/random.c en el kernel de Linux versiones 2.4 anteriores a 2.4.35, realiza operaciones de reconfiguración solo en los primeros bytes de un búfer, l... • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.34.y.git%3Ba=commit%3Bh=bd67d4c7b11cc33ebdc346bc8926d255b354cd64 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

13 Aug 2007 — The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer. El componente drm/i915 en el núcleo Linux anterior a 2.6.22.2, cuando se usa con el conjunto de chips (chipset) i965G y posteriores, permite a usuarios locales con acceso a una sesión X11 y al Direct Rendering Manager (DRM) escribir a posici... • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.2 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

09 Aug 2007 — The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request. El kernel Linux versiones anteriores a 2.6.23-rc1 comprueba la variable global errónea para la opción de montado CIFS sec, lo cual podría permitir a atacantes remotos falsificar tráfico de red CIFS que el cliente conf... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=246595 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Jul 2007 — Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering". NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for r... • http://secunia.com/advisories/26500 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

23 Jul 2007 — Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes. Rule Set Based Access Control (RSBAC) anterior a 1.3.5 no utiliza de forma adecuada el API Crypto Linux Kernel del Linux kernel 2.6.x, el permite a atacantes dependientes del contexto evitar con... • http://download.rsbac.org/code/1.3.5/changes-1.3.5.txt •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Jul 2007 — The process scheduler in the Linux kernel 2.4 performs scheduling based on CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption) by performing voluntary nanosecond sleeps that result in the process not being active during a clock interrupt, as described in "Secretly Monopolizing the CPU Without Superuser Privileges." El planificador de procesos en Linux kernel 2.4 realiza planificación basado en la facturación CPU, recolectada con ... • http://osvdb.org/37126 •

CVSS: 5.5EPSS: 0%CPEs: 172EXPL: 0

10 Jul 2007 — The signal handling in the Linux kernel before 2.6.22, including 2.6.2, when running on PowerPC systems using HTX, allows local users to cause a denial of service via unspecified vectors involving floating point corruption and concurrency, related to clearing of MSR bits. El manejo de señal en el kernel de Linux versiones anteriores a 2.6.22, incluyendo a 2.6.2, cuando se ejecuta en sistemas PowerPC que usan HTX, permite a usuarios locales causar una denegación de servicio por medio de vectores no especific... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245580 •