Page 290 of 3121 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

31 Dec 2005 — The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html •

CVSS: 7.1EPSS: 0%CPEs: 72EXPL: 0

31 Dec 2005 — Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 •

CVSS: 5.5EPSS: 0%CPEs: 80EXPL: 2

31 Dec 2005 — The securelevels implementation in NetBSD 2.1 and earlier, and Linux 2.6.15 and earlier, allows local users to bypass time setting restrictions and set the clock backwards by setting the clock ahead to the maximum unixtime value (19 Jan 2038), which then wraps around to the minimum value (13 Dec 1901), which can then be set ahead to the desired time, aka "settimeofday() time wrap." • http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041178.html •

CVSS: 5.5EPSS: 0%CPEs: 59EXPL: 0

31 Dec 2005 — The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function. • http://marc.info/?l=linux-kernel&m=112323336017157 •

CVSS: 7.5EPSS: 1%CPEs: 175EXPL: 0

31 Dec 2005 — The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages. • http://secunia.com/advisories/18216 •

CVSS: 7.5EPSS: 0%CPEs: 215EXPL: 0

22 Dec 2005 — Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 •

CVSS: 5.5EPSS: 0%CPEs: 98EXPL: 2

14 Dec 2005 — Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs. Linux kernel anteriores a 2.6.15, permite a usuarios locales causar una denegación de servicio (pánico) mediante una llamada set_mempolicy con una máscara de bits 0, lo que causa un pánico cuando ocurre un fallo de página. • https://www.exploit-db.com/exploits/27031 •

CVSS: 7.8EPSS: 4%CPEs: 26EXPL: 0

27 Nov 2005 — Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html •

CVSS: 5.5EPSS: 0%CPEs: 104EXPL: 1

27 Nov 2005 — The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function. • https://www.exploit-db.com/exploits/26648 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 32EXPL: 0

27 Nov 2005 — Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply." • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html •