Page 405 of 4339 results (0.020 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

23 Jan 2006 — ip_nat_pptp in the PPTP NAT helper (netfilter/ip_nat_helper_pptp.c) in Linux kernel 2.6.14, and other versions, allows remote attackers to cause a denial of service (memory corruption or crash) via an inbound PPTP_IN_CALL_REQUEST packet that causes a null pointer to be used in an offset calculation. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=15db34702cfafd24acc60295cf14861e497502ab •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

11 Jan 2006 — The netlink_rcv_skb function in af_netlink.c in Linux kernel 2.6.14 and 2.6.15 allows local users to cause a denial of service (infinite loop) via a nlmsg_len field of 0. • http://secunia.com/advisories/18482 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 47EXPL: 0

06 Jan 2006 — dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key. dm-crypt en el kernel de Linux 2.6.15 y versiones anteriores no borra una estructura antes de ser liberada, lo que lleva a una divulgación de memoria que puede permitir a usuarios locales obtener información sensible de una clave criptográfica. • http://marc.info/?l=linux-kernel&m=113640535312572&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 114EXPL: 0

06 Jan 2006 — wan/sdla.c in Linux kernel 2.6.x before 2.6.11 and 2.4.x before 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels. A ridiculous number of vulnerabilities were discovered and corrected in the L... • http://linux.bkbits.net:8080/linux-2.4/cset%401.1448.91.23?nav=index.html%7Csrc/%7Csrc/drivers%7Csrc/drivers/net%7Csrc/drivers/net/wan%7Crelated/drivers/net/wan/sdla.c •

CVSS: 7.5EPSS: 0%CPEs: 70EXPL: 0

31 Dec 2005 — Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client. • http://secunia.com/advisories/20398 •

CVSS: 7.5EPSS: 1%CPEs: 175EXPL: 0

31 Dec 2005 — The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages. • http://secunia.com/advisories/18216 •

CVSS: 5.5EPSS: 0%CPEs: 60EXPL: 0

31 Dec 2005 — The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory. Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 5.5EPSS: 0%CPEs: 80EXPL: 2

31 Dec 2005 — The securelevels implementation in NetBSD 2.1 and earlier, and Linux 2.6.15 and earlier, allows local users to bypass time setting restrictions and set the clock backwards by setting the clock ahead to the maximum unixtime value (19 Jan 2038), which then wraps around to the minimum value (13 Dec 1901), which can then be set ahead to the desired time, aka "settimeofday() time wrap." The implementations of securelevels on NetBSD and Linux contain an integer overflow, allowing the protection of system time to ... • http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041178.html •

CVSS: 5.5EPSS: 0%CPEs: 32EXPL: 0

31 Dec 2005 — The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761. • http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html •

CVSS: 7.1EPSS: 0%CPEs: 72EXPL: 0

31 Dec 2005 — Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. A ridiculous number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 •