Page 351 of 3790 results (0.018 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2005 — The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169130 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 1

31 Dec 2005 — The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value. • https://www.exploit-db.com/exploits/9363 •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2005 — nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html • CWE-862: Missing Authorization •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

31 Dec 2005 — The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html •

CVSS: 7.1EPSS: 0%CPEs: 72EXPL: 0

31 Dec 2005 — Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 •

CVSS: 5.5EPSS: 0%CPEs: 80EXPL: 2

31 Dec 2005 — The securelevels implementation in NetBSD 2.1 and earlier, and Linux 2.6.15 and earlier, allows local users to bypass time setting restrictions and set the clock backwards by setting the clock ahead to the maximum unixtime value (19 Jan 2038), which then wraps around to the minimum value (13 Dec 1901), which can then be set ahead to the desired time, aka "settimeofday() time wrap." • http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041178.html •

CVSS: 5.5EPSS: 0%CPEs: 59EXPL: 0

31 Dec 2005 — The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function. • http://marc.info/?l=linux-kernel&m=112323336017157 •

CVSS: 7.5EPSS: 1%CPEs: 175EXPL: 0

31 Dec 2005 — The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages. • http://secunia.com/advisories/18216 •

CVSS: 7.5EPSS: 0%CPEs: 215EXPL: 0

22 Dec 2005 — Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 •

CVSS: 5.5EPSS: 0%CPEs: 98EXPL: 2

14 Dec 2005 — Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs. Linux kernel anteriores a 2.6.15, permite a usuarios locales causar una denegación de servicio (pánico) mediante una llamada set_mempolicy con una máscara de bits 0, lo que causa un pánico cuando ocurre un fallo de página. • https://www.exploit-db.com/exploits/27031 •