Page 971 of 5188 results (0.036 seconds)

CVSS: 7.8EPSS: 87%CPEs: 172EXPL: 1

The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18 http://secunia.com/advisories/20182 http://secunia.com/advisories/20225 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/21136 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/21983 http://secunia.com/advisories/22082 http:&#x •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 1

The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load. • http://osvdb.org/31663 http://secunia.com/advisories/20237 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.redhat.com/support/errata/RHSA-2006-0493.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189260 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9390 https://access.redhat.com/security/cve/CVE-2006-1862 https& •

CVSS: 7.8EPSS: 10%CPEs: 135EXPL: 0

SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 10%CPEs: 135EXPL: 0

Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 2%CPEs: 78EXPL: 0

Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21745 http://secunia.com/advisories/22093 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1184 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.osvdb.org/25747 http://www.redhat.com/support •