Page 954 of 5173 results (0.029 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer. La función setsockopt en el soporte Bluetooth L2CAP y HCI en el núcleo de Linux anterior a 2.4.34.3 permite a atacantes remotos dependientes de contexto leer la memoria del núcleo y obtener información sensible mediante vectores no especificados que implican la función copy_from_user accediendo a un búfer de pila no inicializado. • http://rhn.redhat.com/errata/RHSA-2007-0488.html http://secunia.com/advisories/24976 http://secunia.com/advisories/25596 http://secunia.com/advisories/25683 http://secunia.com/advisories/25700 http://secunia.com/advisories/25838 http://secunia.com/advisories/26133 http://secunia.com/advisories/26139 http://secunia.com/advisories/26289 http://secunia.com/advisories/26379 http://secunia.com/advisories/26450 http://secunia.com/advisories/26478 http://secunia.com/advisories&#x •

CVSS: 4.7EPSS: 0%CPEs: 19EXPL: 0

A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions. Un error tipográfico en el Kernel de Linux versión 2.6 anterior a 2.6.21-rc6 y versión 2.4 anterior a 2.4.35 hace que RTA_MAX se utilice como un tamaño de matriz en lugar de RTN_MAX, lo que conlleva a un "out of bound access" mediante las funciones (1) dn_fib_props (dn_fib.c, DECNet) y (2) fib_props (fib_semantics.c, IPv4). • http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.21-rc6 http://rhn.redhat.com/errata/RHSA-2007-0488.html http://secunia.com/advisories/25068 http://secunia.com/advisories/25288 http://secunia.com/advisories/25392 http://secunia.com/advisories/25838 http://secunia.com/advisories/26289 http://secunia.com/advisories/26450 http://secunia.com/advisories/26620 http://secunia.com/advisories/26647 http://secunia.com/advisories/27913 http://secunia.com/advisori • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 46%CPEs: 1EXPL: 1

The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum. La función atalk_sum_skb en AppleTalk para Linux kernel 2.6.x anterior a 2.6.21, y posiblemente 2.4.x, permite a atacantes remotos provocar denegación de servicio (caida) a través de la ventana AppleTalk que es mas pequeña que la longitud de la especificada, la cual dispara una llamada BUG_ON cuando un intento se hace para llevar a cabo una validación de la suma. • https://www.exploit-db.com/exploits/29826 http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html http://secunia.com/advisories/24793 http://secunia.com/advisories/24901 http://secunia.com/advisories/25078 http://secunia.com/advisories/25099 http://secunia.com/advisories/25226 http://secunia.com/advisories/25392 http://secunia.com/advisories/25683 http://secunia.com/advisories/25691 http://secunia.com/advisories/25714 http://secunia.com/advisories/25961 http •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

The DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later does not verify the upper bounds of the optlen value, which allows local users running on certain architectures to read kernel memory or cause a denial of service (oops), a related issue to CVE-2007-1730. La ayuda DCCP en la función do_dccp_getsockopt en net/dccp/proto.c en Linux kernel 2.6.20 y posteriores no verifica los limites superiores en el valor optlenm, lo cual permite a usuarios locales funcionando bajo ciertas arquitecturas leer memoria del kernel o provocar denegación de servicio (oops), un asunto relacionado con CVE-2007-1730. • https://www.exploit-db.com/exploits/3595 https://www.exploit-db.com/exploits/3587 http://securityreason.com/securityalert/2511 http://www.securityfocus.com/archive/1/463969/100/0/threaded http://www.securitytracker.com/id?1017820 https://exchange.xforce.ibmcloud.com/vulnerabilities/33274 https://exchange.xforce.ibmcloud.com/vulnerabilities/43321 •

CVSS: 6.6EPSS: 0%CPEs: 3EXPL: 2

Integer signedness error in the DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later allows local users to read kernel memory or cause a denial of service (oops) via a negative optlen value. Un error en la presencia de signo en un entero en el soporte DCCP de la función do_dccp_getsockopt del net/dccp/proto.c en el kernel del Linux 2.6.20 y versiones posteriores permite a usuarios locales leer la memoria del kernel y provocar una denegación de servicio (oops) mediante un valor optlen negativo. • https://www.exploit-db.com/exploits/3595 https://www.exploit-db.com/exploits/3587 http://marc.info/?l=dccp&m=117509584316267&w=2 http://secunia.com/advisories/25392 http://securityreason.com/securityalert/2482 http://www.securityfocus.com/archive/1/463934/100/0/threaded http://www.securityfocus.com/archive/1/464144/100/0/threaded http://www.securityfocus.com/bid/23162 http://www.securitytracker.com/id?1017820 http://www.ubuntu.com/usn/usn-464-1 http://www. •