Page 584 of 2995 results (0.025 seconds)

CVSS: 7.8EPSS: 10%CPEs: 135EXPL: 0

SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 10%CPEs: 135EXPL: 0

Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 2%CPEs: 78EXPL: 0

Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21745 http://secunia.com/advisories/22093 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1184 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.osvdb.org/25747 http://www.redhat.com/support •

CVSS: 4.9EPSS: 0%CPEs: 105EXPL: 0

Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ http://marc.info/?l=linux-scsi&m=112540053711489&w=2 http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21555 http://secunia.com/advisories/21745 http://secunia.com/advisories/ • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 148EXPL: 0

The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process. La lógica selinux_ptrace en hooks.c en SELinux para Linux 2.6.6 permite a usuarios locales con permisos ptrace cambiar el trazador SID a un SID de otro proceso. • http://marc.info/?l=git-commits-head&m=114210002712363&w=2 http://marc.info/?l=selinux&m=114226465106131&w=2 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/21465 http://secunia.com/advisories/22093 http://secunia.com/advisories/22417 http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006&#x •