CVE-2004-0883
https://notcve.org/view.php?id=CVE-2004-0883
01 Dec 2004 — Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header siz... • http://marc.info/?l=bugtraq&m=110072140811965&w=2 •
CVE-2004-1072
https://notcve.org/view.php?id=CVE-2004-1072
01 Dec 2004 — The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code. El cargador binfmt_elf (binfmt_elf.c) del kernel de Linux 2.4.x hasta 2.4.27, y 2.6.x a 2.6.8 puede crear una cadena de nombre de intérprete sin terminador nulo, lo q... • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •
CVE-2004-1074 – Linux Kernel 2.4.x/2.6.x - Local Denial of Service / Memory Disclosure
https://notcve.org/view.php?id=CVE-2004-1074
01 Dec 2004 — The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary. La funcionalidad binfmt en el kernel de linux, cuando está establecido memory overcommit, permite a usuarios locales causar una denegación de servicio (kernel oops) mediante un binario a.out malformado. • https://www.exploit-db.com/exploits/24777 •
CVE-2004-0986
https://notcve.org/view.php?id=CVE-2004-0986
19 Nov 2004 — Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers. • http://rpmfind.net/linux/RPM/suse/updates/9.2/i386/rpm/i586/iptables-1.2.11-4.2.i586.html •
CVE-2004-0814
https://notcve.org/view.php?id=CVE-2004-0814
28 Oct 2004 — Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch. Múltiples condiciones de carrera en la capa de terminal de Linux kernel 2.4.x y 2.6.x anteriores a 2.6.9... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672 •
CVE-2004-0685
https://notcve.org/view.php?id=CVE-2004-0685
26 Oct 2004 — Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage. Ciertos controladores USB en el kernel de Linux 2.4 usa la función copy_to_user con structuras no inicializadas, lo que podría permitir a usuarios locales obtener información sensible leyendo memoria que no ha sido borrada desde el uso anterior. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921 •
CVE-2004-0816 – Linux Kernel 2.6.x - IPTables Logging Rules Integer Underflow Remote (PoC)
https://notcve.org/view.php?id=CVE-2004-0816
26 Oct 2004 — Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet. Vaciamiento de enteros en las reglas de registro del cortafuegos de iptables en Linux anteriores a 2.6.8 permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete IP malformado. • https://www.exploit-db.com/exploits/24696 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2004-0415 – Linux Kernel 2.4.26 - File Offset Pointer Handling Memory Disclosure
https://notcve.org/view.php?id=CVE-2004-0415
05 Aug 2004 — Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory. • https://www.exploit-db.com/exploits/375 •
CVE-2004-0658
https://notcve.org/view.php?id=CVE-2004-0658
13 Jul 2004 — Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket. • http://marc.info/?l=bugtraq&m=108793792820740 •
CVE-2004-0447
https://notcve.org/view.php?id=CVE-2004-0447
09 Jul 2004 — Unknown vulnerability in Linux before 2.4.26 for IA64 allows local users to cause a denial of service, with unknown impact. NOTE: due to a typo, this issue was accidentally assigned CVE-2004-0477. This is the proper candidate to use for the Linux local DoS. Vulnerabilidad desconocida en Linux para IA64 anteriores a 2.4.26 permite a usuarios locales causar una denegación de servicio, con impacto desconocido. • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc •