Page 346 of 3790 results (0.018 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

15 Jun 2006 — artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges. artswrapper en aRts, cuando se ejecuta como root sobre linux 2.6.0 o versiones posteriores, no valida la variable setuid de retorno de la llamada a la función, lo que permite a usuarios locales ganar privilegios de root al provocar un fallo sobre s... • http://dot.kde.org/1150310128 • CWE-273: Improper Check for Dropped Privileges •

CVSS: 4.7EPSS: 0%CPEs: 38EXPL: 1

27 May 2006 — Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h. Condición de carrera en el kernel de Linux 2.6.15 hasta la versión 2.6.17, cuando se está ejecutado en plataformas SMP, permite a usuarios loc... • https://www.exploit-db.com/exploits/27925 •

CVSS: 7.8EPSS: 90%CPEs: 172EXPL: 1

25 May 2006 — The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

24 May 2006 — The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load. • http://osvdb.org/31663 •

CVSS: 9.1EPSS: 10%CPEs: 135EXPL: 0

22 May 2006 — Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 10%CPEs: 135EXPL: 0

22 May 2006 — SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 • CWE-20: Improper Input Validation •

CVSS: 9.1EPSS: 2%CPEs: 78EXPL: 0

19 May 2006 — Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

19 May 2006 — Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE. • http://bugs.gentoo.org/show_bug.cgi?id=133465 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.5EPSS: 0%CPEs: 11EXPL: 0

18 May 2006 — choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process. • http://secunia.com/advisories/20237 •

CVSS: 5.5EPSS: 0%CPEs: 105EXPL: 0

18 May 2006 — Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 • CWE-20: Improper Input Validation •