![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-1089
https://notcve.org/view.php?id=CVE-2007-1089
23 Feb 2007 — IBM DB2 Universal Database (UDB) 9.1 GA through 9.1 FP1 allows local users with table SELECT privileges to perform unauthorized UPDATE and DELETE SQL commands via unknown vectors. IBM DB2 Universal Database (UDB) 9.1 GA hasta 9.1 FP1 permite a usuarios locales con privilegios en la tabla SELECT realizar los comandos no autorizados SQL: UPDATE y DELETEa través de vectores desconocidos. • http://secunia.com/advisories/24283 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0772
https://notcve.org/view.php?id=CVE-2007-0772
20 Feb 2007 — The Linux kernel 2.6.13 and other versions before 2.6.20.1 allows remote attackers to cause a denial of service (oops) via a crafted NFSACL 2 ACCESS request that triggers a free of an incorrect pointer. El kernel de Linux versión 2.6.13 y otras versiones anteriores a 2.6.20.1, permite a atacantes remotos causar una denegación de servicio (oops) por medio de una petición NFSACL 2 ACCESS que desencadena una liberación de un puntero incorrecto. • http://fedoranews.org/cms/node/2739 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0958 – core-dumping unreadable binaries via PT_INTERP
https://notcve.org/view.php?id=CVE-2007-0958
15 Feb 2007 — Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073. Linux kernel 2.6.x versiones anteriores a 2.6.20 permite a atacantes remotos leer binarios inleibles usando la funcionalidad intérprete (PT_INTERP) y disparar un volcado de memoria, variante de CVE-2004-1073. • http://osvdb.org/35930 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0822
https://notcve.org/view.php?id=CVE-2007-0822
07 Feb 2007 — umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents. umount cuando se ejecuta con el kernel de Linux 2.6.15 en el Slackware Linux 10.2 permite a usuarios locales lanzar una referencia a NULL y una caída de la aplicación, m... • http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0012.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-0006
https://notcve.org/view.php?id=CVE-2007-0006
06 Feb 2007 — The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as "spinlock CPU recursion." El código de prevención de colisiones de números de serial de claves en la función key_alloc_serial en el kernel de Linux versiones 2.6.9 hasta 2.6.20, permite a usuarios locales causar una denegación de servicio (bloqueo) por medio de vectores... • http://bugzilla.kernel.org/show_bug.cgi?id=7727 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-5753 – kernel listxattr syscall can corrupt user space programs
https://notcve.org/view.php?id=CVE-2006-5753
30 Jan 2007 — Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors. Vulnerabilidad no especificada en la llamada al sistema listxattr del núcleo de Linux, cuando un "inode malo" (bad inode) está presente, permite a usuarios locales provocar una denegación de servicio (corrupción de datos) y posiblemente obtener privilegios mediante vectores no especificados. • http://fedoranews.org/cms/node/2739 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-6921 – kernel: denial of service with wedged processes
https://notcve.org/view.php?id=CVE-2006-6921
12 Jan 2007 — Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died. Versiones no especificadas del kernel de Linux, permiten a usuarios locales causar una denegación de servicio (proceso zombi irrecuperable) por medio de un programa con ciertas instrucciones que previene a init de recoger apropiadamente un proceso hijo cuyo proceso padre ha termina... • http://secunia.com/advisories/27436 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-5755 – kernel: local denial of service due to NT bit leakage
https://notcve.org/view.php?id=CVE-2006-5755
31 Dec 2006 — Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task. El núcleo de Linux anterior a 2.6.18, cuando se ejecuta en sistemas x86_64, no guarda o restaura adecuadamente las EFLAGS durante un cambio de contexto, lo cual permite a usuarios locales provocar una denegación de servicio (caíd... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-6106
https://notcve.org/view.php?id=CVE-2006-6106
19 Dec 2006 — Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field. Múltiples desbordamientos de búfer en la función cmtp_recv_interopmsg en el controlador Bluetooth ... • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.5 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-6304 – kernel: use flag in do_coredump()
https://notcve.org/view.php?id=CVE-2006-6304
14 Dec 2006 — The do_coredump function in fs/exec.c in the Linux kernel 2.6.19 sets the flag variable to O_EXCL but does not use it, which allows context-dependent attackers to modify arbitrary files via a rewrite attack during a core dump. La función do_coredump en fs/exec.c del Kernel Linux 2.6.19.1, marca la bandera O_EXCL pero no la usa, lo cual permite a atacantes dependientes del contexto modificar ficheros de su elección mediante un ataque de sobreescritura durante un volcado de memoria. • http://secunia.com/advisories/23349 • CWE-399: Resource Management Errors •