Page 572 of 5730 results (0.038 seconds)

CVSS: 7.5EPSS: 3%CPEs: 124EXPL: 0

20 Nov 2004 — The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times. La función smb_recv_trans2 en el sistema de ficheros samba (smbfs) en los kernel de Linux 2.4 y 2.6 no maneja adecuadamente el reensamblaje de pa... • http://marc.info/?l=bugtraq&m=110072140811965&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 120EXPL: 0

28 Oct 2004 — Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch. Múltiples condiciones de carrera en la capa de terminal de Linux kernel 2.4.x y 2.6.x anteriores a 2.6.9... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672 •

CVSS: 5.5EPSS: 0%CPEs: 206EXPL: 0

26 Oct 2004 — Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage. Ciertos controladores USB en el kernel de Linux 2.4 usa la función copy_to_user con structuras no inicializadas, lo que podría permitir a usuarios locales obtener información sensible leyendo memoria que no ha sido borrada desde el uso anterior. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=127921 •

CVSS: 9.1EPSS: 0%CPEs: 87EXPL: 1

05 Aug 2004 — Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory. • https://www.exploit-db.com/exploits/375 •

CVSS: 5.5EPSS: 0%CPEs: 23EXPL: 0

14 Jul 2004 — The Equalizer Load-balancer for serial network interfaces (eql.c) in Linux kernel 2.6.x up to 2.6.7 allows local users to cause a denial of service via a non-existent device name that triggers a null dereference. El equilibrador de carga Equalizer de interfaces de red serie (eql.c) en Linux kernel 2.6 a 2.6.7 permite a usuarios locales causar una denegación de servicio mediante un nombre de dispositivo no existente que dispara una desreferencia nula. • http://linux.bkbits.net:8080/linux-2.6/cset%4040d4aa72hPLWy-jMLr0eJAXMxHcNZg •

CVSS: 7.8EPSS: 0%CPEs: 156EXPL: 0

13 Jul 2004 — Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket. • http://marc.info/?l=bugtraq&m=108793792820740 •

CVSS: 2.1EPSS: 0%CPEs: 184EXPL: 3

26 May 2004 — cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption. • https://www.exploit-db.com/exploits/25707 •

CVSS: 9.8EPSS: 0%CPEs: 34EXPL: 0

05 May 2004 — The framebuffer driver in Linux kernel 2.6.x does not properly use the fb_copy_cmap function, with unknown impact. El controlador de framebuffer en Linux kernel 2.6.x no usa adecuadamente la función fb_copy_cmap, con impacto desconocido. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 2

15 Mar 2004 — smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted. smbmnt en Samba 2.0 y 3.0 para Linux 2.6, cuando se instala con setuid, permite a usuarios locales ganar privilegios de root montando un recurso compartido de Samba que contiene un programa con setuid de root, cuyos atributos no se limpian cuando el recurso compartido es el... • https://www.exploit-db.com/exploits/23674 •

CVSS: 7.8EPSS: 0%CPEs: 112EXPL: 3

18 Feb 2004 — The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985. La función do_remap en mremap de Linux 2.2 a 2.2.25, 2.4 a 2.4.24, y 2.6 a 2.6.2 no comprueba adecuadamente el valor devuelto por la función do_munmap cuando se excede el número máximo... • https://www.exploit-db.com/exploits/160 •