CVE-2003-0859
https://notcve.org/view.php?id=CVE-2003-0859
The getifaddrs function in GNU libc (glibc) 2.2.4 and earlier allows local users to cause a denial of service by sending spoofed messages as other users to the kernel netlink interface. La función getifaddres en GNU libc (glibc) 2.2.4 y anteriores permite a usuarios locales causar una denegación de servicio enviando mensajes suplantando a otros usuarios al interfaz del kernel netlink. • http://www.redhat.com/support/errata/RHSA-2003-325.html http://www.redhat.com/support/errata/RHSA-2003-334.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11337 https://access.redhat.com/security/cve/CVE-2003-0859 https://bugzilla.redhat.com/show_bug.cgi?id=1617097 •
CVE-2003-0689
https://notcve.org/view.php?id=CVE-2003-0689
The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow. • http://www.redhat.com/support/errata/RHSA-2003-249.html http://www.redhat.com/support/errata/RHSA-2003-325.html https://access.redhat.com/security/cve/CVE-2003-0689 https://bugzilla.redhat.com/show_bug.cgi?id=1617066 •
CVE-2003-0699
https://notcve.org/view.php?id=CVE-2003-0699
The C-Media PCI sound driver in Linux before 2.4.21 does not use the get_user function to access userspace, which crosses security boundaries and may facilitate the exploitation of vulnerabilities, a different vulnerability than CVE-2003-0700. El controlador de dispositivo de sonido de C-Media PCI para Linux 2.4.21 no usa la función get_user para acceder al espacio de usuario, lo que cruza límites de seguridad y puede facilitar la explotación de vulnerabilidades. • http://www.redhat.com/support/errata/RHSA-2003-198.html http://www.redhat.com/support/errata/RHSA-2003-238.html http://www.redhat.com/support/errata/RHSA-2003-239.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A387 https://access.redhat.com/security/cve/CVE-2003-0699 https://bugzilla.redhat.com/show_bug.cgi?id=1617072 •
CVE-2003-0549
https://notcve.org/view.php?id=CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) via a short authorization key name. Vulnerabilidad desconocida en el soporte XDMPC (X Display Manager Control Protocol - Protocolo de Control de Administrador de Visualizador X) en GDM anteriores a 2.4.1.6 permite a atacantes causar una denegación de servicio (caída del demonio), un problema diferente de CAN-2003-0548. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729 http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html http://www.redhat.com/support/errata/RHSA-2003-258.html http://www.redhat.com/support/errata/RHSA-2003-259.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A129 https://access.redhat.com/security/cve/CVE-2003-0549 https://bugzilla.redhat.com/show_bug.cgi?id=1617052 •
CVE-2003-0548
https://notcve.org/view.php?id=CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM before 2.4.1.6 allows attackers to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549. Vulnerabilidad desconocida en el soporte XDMPC (X Display Manager Control Protocol - Protocolo de Control de Administrador de Visualizador X) en GDM anteriores a 2.4.1.6 permite a atacantes causar una denegación de servicio (caída del demonio), un problema diferente de CAN-2003-0549. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000729 http://mail.gnome.org/archives/gnome-hackers/2003-August/msg00045.html http://www.redhat.com/support/errata/RHSA-2003-258.html http://www.redhat.com/support/errata/RHSA-2003-259.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A113 https://access.redhat.com/security/cve/CVE-2003-0548 https://bugzilla.redhat.com/show_bug.cgi?id=1617051 •