CVE-2006-2936
https://notcve.org/view.php?id=CVE-2006-2936
The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued. El controlador ftdi_sio (usb/serial/ftdi_sio.c) en el kernel de Linux de 2.6.x a 2.6.17 y posiblemente versiones posteriores, permite a usuarios locales provocar una denegación de servicio (consumo de memoria) al escribir mas datos al puerto serie de los que puede manejar el hardware, lo que provoca que los datos queden en cola. • http://secunia.com/advisories/20703 http://secunia.com/advisories/21057 http://secunia.com/advisories/21298 http://secunia.com/advisories/21605 http://secunia.com/advisories/21614 http://secunia.com/advisories/21934 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://secunia.com/advisories/24547 http://secunia.com/advisories/25226 http://secunia.com/advisories/25683 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http://www.debian • CWE-399: Resource Management Errors •
CVE-2006-2451 – Linux Kernel 2.6.13 < 2.6.17.4 - 'sys_prctl()' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2006-2451
The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions. El soporte suid_dumpable de Linux kernel 2.6.13 hasta versiones anteriores a 2.6.17.4, y 2.6.16 anterior a 2.6.16.24, permite a usuarios locales provocar una denegación de servicio (agotamiento de disco) y posiblemente obtener privilegios a través del argumento PR_SET_DUMPABLE de la función prctl y un programa que provoca que se cree un fichero de volcado de memoria (core dump) en un directorio en el que el usuario no tiene permisos. The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and POSSIBLY gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions. • https://www.exploit-db.com/exploits/2004 https://www.exploit-db.com/exploits/2005 https://www.exploit-db.com/exploits/2006 https://www.exploit-db.com/exploits/2011 https://www.exploit-db.com/exploits/2031 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195902 http://secunia.com/advisories/20953 http://secunia.com/advisories/20960 http://secunia.com/advisories/20965 http://secunia.com/advisories/20986 http://secunia.com/advisories/20991 http://secunia.com/ad • CWE-399: Resource Management Errors •
CVE-2006-2935
https://notcve.org/view.php?id=CVE-2006-2935
The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow. La función dvd_read_bca en el código de manejo de los DVD en el fichero drivers/cdrom/cdrom.c del kernel de Linux v2.2.16 y posteriores, asigna un valor incorrecto a la variable "length" (longitud), lo que permite a usuarios locales ejecutar código de su elección a través de dispositivos de almacenamiento USB modificados maliciosamente que disparan un desbordamiento de buffer. • http://bugzilla.kernel.org/show_bug.cgi?id=2966 http://secunia.com/advisories/21179 http://secunia.com/advisories/21298 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/21614 http://secunia.com/advisories/21695 http://secunia.com/advisories/21934 http://secunia.com/advisories/22082 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://secunia.com/advisories/22497 http://secunia.com/advisories/ • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2006-2934
https://notcve.org/view.php?id=CVE-2006-2934
SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer. SCTP conntrack (ip_conntrack_proto_sctp.c) en netfilter para Linux kernel v2.6.17 anteriores v2.6.17.3 y v2.6.16 anteriores a v 2.6.16.23 permite a los atacantes remotos causar una denegación de servicio (caída) a través de un paquete sin trozos, lo que causa una variable para contener un valor inválido que es más tarde utiliza para desreferenciar un puntero. • http://secunia.com/advisories/20917 http://secunia.com/advisories/20986 http://secunia.com/advisories/21179 http://secunia.com/advisories/21298 http://secunia.com/advisories/21465 http://secunia.com/advisories/21498 http://secunia.com/advisories/21614 http://secunia.com/advisories/21934 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.kb.cert.org/vuls/id/717844 http://www.kernel.org/git/?p=linux/kernel/ • CWE-399: Resource Management Errors •
CVE-2006-0456
https://notcve.org/view.php?id=CVE-2006-0456
The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors. La función strnlen_user en el kernel Linux anterior a la versión 2.6.16 en IBM S/390 puede devolver un valor incorrecto, lo que permite a usuarios locales provocar una denegación de servicio mediante vectores desconocidos. • http://secunia.com/advisories/20914 http://secunia.com/advisories/21465 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=331c46591414f7f92b1cec048009abe89892ee79 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=331c46591414f7f92b1cec048009abe89892ee79 http://www.kernel.org/pub •