Page 6 of 36 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html http://www.kb.cert.org/vuls/id/358960 http://www.openbsd.org/errata.html#userldt http://www.osvdb.org/6141 http://www.securityfocus.com/bid/2739 https://exchange.xforce.ibmcloud.com/vulnerabilities/6222 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7574 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7575 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 2

The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. • https://www.exploit-db.com/exploits/19261 ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc http://marc.info/?l=bugtraq&m=90233906612929&w=2 http://www.iss.net/security_center/static/7577.php http://www.securityfocus.com/bid/331 http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html •