CVE-2008-1615 – kernel: ptrace: Unprivileged crash on x86_64 %cs corruption
https://notcve.org/view.php?id=CVE-2008-1615
Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls. El kernel de Linux versión 2.6.18 y posiblemente otras versiones, cuando corren bajo arquitecturas AMD64, permite a usuarios locales provocar una denegación de servicio (caída) a través de determinadas llamadas ptrace. • http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html http://secunia.com/advisories/30112 http://secunia.com/advisories/30252 http://secunia.com/advisories/30294 http://secunia.com • CWE-399: Resource Management Errors •
CVE-2007-4574 – EM64T local DoS
https://notcve.org/view.php?id=CVE-2007-4574
Unspecified vulnerability in the "stack unwinder fixes" in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors. Una vulnerabilidad no especificada en las "stack unwinder fixes" en el kernel de Red Hat Enterprise Linux versión 5, cuando es ejecutado en AMD64 e Intel 64, permite a usuarios locales causar una denegación de servicio por medio de vectores desconocidos. • http://osvdb.org/45489 http://secunia.com/advisories/27322 http://securitytracker.com/id?1018844 http://www.redhat.com/support/errata/RHSA-2007-0940.html http://www.securityfocus.com/bid/26158 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10681 https://access.redhat.com/security/cve/CVE-2007-4574 https://bugzilla.redhat.com/show_bug.cgi?id=298141 •
CVE-2007-4315
https://notcve.org/view.php?id=CVE-2007-4315
The AMD ATI atidsmxx.sys 3.0.502.0 driver on Windows Vista allows local users to bypass the driver signing policy, write to arbitrary kernel memory locations, and thereby gain privileges via unspecified vectors, as demonstrated by "Purple Pill". El controlador AMD ATI atidsmxx.sys 3.0.502.0 en Windows Vista permite a usuarios locales evitar la política de firma del controlador, escribir en zonas de memoria del núcleo, y de ese modo obtener privilegios mediante vectores no especificados, como ha sido demostrado por "Purple Pill". • http://blogs.zdnet.com/security/?p=427 http://blogs.zdnet.com/security/?p=438 http://secunia.com/advisories/26448 http://www.securityfocus.com/bid/25265 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-1036
https://notcve.org/view.php?id=CVE-2005-1036
FreeBSD 5.x to 5.4 on AMD64 does not properly initialize the IO permission bitmap used to allow user access to certain hardware, which allows local users to bypass intended access restrictions to cause a denial of service, obtain sensitive information, and possibly gain privileges. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc • CWE-909: Missing Initialization of Resource •