Page 320 of 3415 results (0.021 seconds)

CVSS: 8.4EPSS: 5%CPEs: 1EXPL: 0

08 Aug 2005 — Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol. Desbordamiento de búfer en la función xdr_xcode_array2 en xdr.c en el kernel de Linux 2.6.5 y anterirores podría permitir a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante datos XDR artesa... • http://linux.bkbits.net:8080/linux-2.6/cset%4042b9c4fdYUuaq0joRUZi8W0Q-2hA1A •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

04 Aug 2005 — Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array. Desbordamiento en el índice del array en la función xfrm_sk_policy_insert en xfrm_user.c en el kernel de Linux 2.6 permite que usuarios locales provoquen una denegación de servicio y posiblemente ejeucte... • http://secunia.com/advisories/16298 • CWE-667: Improper Locking •

CVSS: 7.8EPSS: 0%CPEs: 92EXPL: 0

11 Jul 2005 — Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

30 Jun 2005 — The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address. La llamada a "ptrace" en el kernel de Linux 2.6.8.1 y 2.6.10 para la plataforma AMD64 permite que usuarios locales causen una denegación de servicio (caída del kernel) mediante una dirección "no-canónica". • http://secunia.com/advisories/15786 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

14 Jun 2005 — The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17073 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

08 Jun 2005 — ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17002 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

31 May 2005 — syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments. • http://secunia.com/advisories/18056 •

CVSS: 9.1EPSS: 0%CPEs: 29EXPL: 1

17 May 2005 — Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

17 May 2005 — The pkt_ioctl function in the pktcdvd block device ioctl handler (pktcdvd.c) in Linux kernel 2.6.12-rc4 and earlier calls the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space and allows local users to cause a denial of service and possibly execute arbitrary code, a similar vulnerability to CVE-2005-1264. • https://www.exploit-db.com/exploits/998 •

CVSS: 7.8EPSS: 0%CPEs: 129EXPL: 1

11 May 2005 — The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 •