Page 309 of 3112 results (0.060 seconds)

CVSS: 6.2EPSS: 4%CPEs: 1EXPL: 1

01 Aug 2003 — Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call. Error de falta de signo en enteros en la función decode_fh de nfs3xdr.c en el kernel de Linux anteriores a 2 .4.21 permite a atacantes remotos causar una denegación de servicio (pánico del kernel) mediante un valor de tamaño negativo en los datos XDR de una llamada de procedimien... • https://www.exploit-db.com/exploits/68 •

CVSS: 4.7EPSS: 0%CPEs: 27EXPL: 1

25 Jul 2003 — A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). Una condición de carrera en la manera que los punteros env_start y env_end son inicializados en la llamada al sistema execve y usada en fs/proc/base.c en Linux 2.4 permite a usuarios locales causar una denegación de servicio (caída). • https://www.exploit-db.com/exploits/22840 •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

25 Jul 2003 — Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash). • http://ftp.belnet.be/linux/gentoo-portage/sys-kernel/gentoo-sources/files/gentoo-sources-2.4.CAN-2003-0643.patch •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

15 Jul 2003 — The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks. La función del kernel strncpy en Linux 2.4 y 2.5 no rellena con %NUL el búfer de otra arquitectura que no sea x86, opuestamente a la conducta esperada de la strncpy implementada en libc, lo que podría llevar a fugas de información. • http://marc.info/?l=linux-kernel&m=105796021120436&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 91EXPL: 0

15 May 2003 — The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. La llamada al sistema ioperm en los Kernels de Linux anteriores al 2.4.20 no restringe apropiadamente los privilegios, lo que permite que usuarios locales obtengan permisos de lectura o escritura sobre ciertos puertos. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 4

18 Mar 2003 — The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. • https://www.exploit-db.com/exploits/3 •

CVSS: 5.3EPSS: 25%CPEs: 37EXPL: 5

08 Jan 2003 — Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. Múltiples controladores de dispositivo (device drivers) de Tarjetas de Interfaz de Red (Network Interface Card - NIC) Ethernet no rellenan las tramas con bytes nulos, lo que permite a atacantes remotos obtener información de paquetes anteriores o memoria del kernel ... • https://packetstorm.news/files/id/121969 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 0%CPEs: 47EXPL: 0

31 Dec 2002 — Unspecified vulnerability in the pcilynx ieee1394 firewire driver (pcilynx.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors, related to "wrap handling." • http://linux.bkbits.net:8080/linux-2.4/cset%403d6aadcbBIDX67Zl6zZnVKRcsilCVQ •

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 1

31 Dec 2002 — Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries. • http://online.securityfocus.com/archive/1/281100 •

CVSS: 10.0EPSS: 0%CPEs: 47EXPL: 0

31 Dec 2002 — Signed integer overflow in the bttv_read function in the bttv driver (bttv-driver.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors. • http://linux.bkbits.net:8080/linux-2.4/cset%403d6badc0mxsPaOTT_GuPVxCp1_ormw •