CVE-2006-2444 – Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-2444
The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18 http://secunia.com/advisories/20182 http://secunia.com/advisories/20225 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/21136 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/21983 http://secunia.com/advisories/22082 http: •
CVE-2006-1862
https://notcve.org/view.php?id=CVE-2006-1862
The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load. • http://osvdb.org/31663 http://secunia.com/advisories/20237 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.redhat.com/support/errata/RHSA-2006-0493.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189260 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9390 https://access.redhat.com/security/cve/CVE-2006-1862 https& •
CVE-2006-1858
https://notcve.org/view.php?id=CVE-2006-1858
SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-20: Improper Input Validation •
CVE-2006-1857
https://notcve.org/view.php?id=CVE-2006-1857
Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-1856
https://notcve.org/view.php?id=CVE-2006-1856
Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21745 http://secunia.com/advisories/22093 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1184 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.osvdb.org/25747 http://www.redhat.com/support •