Page 365 of 3737 results (0.090 seconds)

CVSS: 7.8EPSS: 0%CPEs: 91EXPL: 0

15 May 2003 — The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. La llamada al sistema ioperm en los Kernels de Linux anteriores al 2.4.20 no restringe apropiadamente los privilegios, lo que permite que usuarios locales obtengan permisos de lectura o escritura sobre ciertos puertos. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0076.html •

CVSS: 7.5EPSS: 12%CPEs: 1EXPL: 0

08 May 2003 — The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions. La implementación de la caché de ruta en Linux 2.4 y el módulo Netfilter IP conntrack permite que atacantes remotos provoquen una denegación de servicio (agotamiento de CPU) mediante paquetes con una dirección fuente alterada (lo que causa un elevado número de col... • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0073.html •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 4

18 Mar 2003 — The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. • https://www.exploit-db.com/exploits/3 •

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

19 Feb 2003 — Linux kernel 2.4.10 through 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption. Linux kernel 2.4.10 y versiones posteriores incluyendo 2.4.18, no maneja adecuadamente la característica O_REDIRECT, lo que permite a atacantes locales con privilegios de escritura leer porciones de ficheros previamente borrados, o producir corrupción en el sistema de ficheros. • http://linux.bkbits.net:8080/linux-2.4/cset%403e2f193drGJDBg9SG6JwaDQwCBnAMQ •

CVSS: 5.3EPSS: 25%CPEs: 37EXPL: 5

08 Jan 2003 — Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. Múltiples controladores de dispositivo (device drivers) de Tarjetas de Interfaz de Red (Network Interface Card - NIC) Ethernet no rellenan las tramas con bytes nulos, lo que permite a atacantes remotos obtener información de paquetes anteriores o memoria del kernel ... • https://packetstorm.news/files/id/121969 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 1

31 Dec 2002 — Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries. • http://online.securityfocus.com/archive/1/281100 •

CVSS: 10.0EPSS: 0%CPEs: 47EXPL: 0

31 Dec 2002 — Signed integer overflow in the bttv_read function in the bttv driver (bttv-driver.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors. • http://linux.bkbits.net:8080/linux-2.4/cset%403d6badc0mxsPaOTT_GuPVxCp1_ormw •

CVSS: 6.2EPSS: 0%CPEs: 47EXPL: 0

31 Dec 2002 — The linux 2.4 kernel before 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers. • http://linux.bkbits.net:8080/linux-2.4/diffs/arch/i386/kernel/i387.c%401.6 •

CVSS: 2.1EPSS: 0%CPEs: 49EXPL: 0

31 Dec 2002 — ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0279.html •

CVSS: 7.5EPSS: 0%CPEs: 66EXPL: 0

31 Dec 2002 — The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted. • http://archives.neohapsis.com/archives/bugtraq/2002-12/0025.html • CWE-264: Permissions, Privileges, and Access Controls •