
CVE-2003-0462 – Linux Kernel 2.4 - SUID 'execve()' System Call Race Condition Executable File Read
https://notcve.org/view.php?id=CVE-2003-0462
25 Jul 2003 — A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). Una condición de carrera en la manera que los punteros env_start y env_end son inicializados en la llamada al sistema execve y usada en fs/proc/base.c en Linux 2.4 permite a usuarios locales causar una denegación de servicio (caída). • https://www.exploit-db.com/exploits/22840 •

CVE-2003-0643
https://notcve.org/view.php?id=CVE-2003-0643
25 Jul 2003 — Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash). • http://ftp.belnet.be/linux/gentoo-portage/sys-kernel/gentoo-sources/files/gentoo-sources-2.4.CAN-2003-0643.patch •

CVE-2003-0465
https://notcve.org/view.php?id=CVE-2003-0465
15 Jul 2003 — The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks. La función del kernel strncpy en Linux 2.4 y 2.5 no rellena con %NUL el búfer de otra arquitectura que no sea x86, opuestamente a la conducta esperada de la strncpy implementada en libc, lo que podría llevar a fugas de información. • http://marc.info/?l=linux-kernel&m=105796021120436&w=2 •

CVE-2003-0246
https://notcve.org/view.php?id=CVE-2003-0246
15 May 2003 — The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. La llamada al sistema ioperm en los Kernels de Linux anteriores al 2.4.20 no restringe apropiadamente los privilegios, lo que permite que usuarios locales obtengan permisos de lectura o escritura sobre ciertos puertos. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html •

CVE-2003-0127 – Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2003-0127
18 Mar 2003 — The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. • https://www.exploit-db.com/exploits/3 •

CVE-2003-0001 – Linux Kernel 2.0.x/2.2.x/2.4.x (FreeBSD 4.x) - Network Device Driver Frame Padding Information Disclosure
https://notcve.org/view.php?id=CVE-2003-0001
08 Jan 2003 — Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. Múltiples controladores de dispositivo (device drivers) de Tarjetas de Interfaz de Red (Network Interface Card - NIC) Ethernet no rellenan las tramas con bytes nulos, lo que permite a atacantes remotos obtener información de paquetes anteriores o memoria del kernel ... • https://packetstorm.news/files/id/121969 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2002-1572
https://notcve.org/view.php?id=CVE-2002-1572
31 Dec 2002 — Signed integer overflow in the bttv_read function in the bttv driver (bttv-driver.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors. • http://linux.bkbits.net:8080/linux-2.4/cset%403d6badc0mxsPaOTT_GuPVxCp1_ormw •

CVE-2002-1571
https://notcve.org/view.php?id=CVE-2002-1571
31 Dec 2002 — The linux 2.4 kernel before 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers. • http://linux.bkbits.net:8080/linux-2.4/diffs/arch/i386/kernel/i387.c%401.6 •

CVE-2002-1963
https://notcve.org/view.php?id=CVE-2002-1963
31 Dec 2002 — Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries. • http://online.securityfocus.com/archive/1/281100 •

CVE-2002-1976
https://notcve.org/view.php?id=CVE-2002-1976
31 Dec 2002 — ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0279.html •