
CVE-2009-0343 – Systrace 1.x (Linux Kernel x64) - Aware Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-0343
29 Jan 2009 — Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes. Niels Provos Systrace v1.6f y anteriores en las plataformas Linux x86_64 permite a usuarios locales evitar las restricciones de acceso previstas, mediante una syscal de 32 bit, con un número correspondiente a una... • https://www.exploit-db.com/exploits/32751 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2007-1030
https://notcve.org/view.php?id=CVE-2007-1030
21 Feb 2007 — Niels Provos libevent 1.2 and 1.2a allows remote attackers to cause a denial of service (infinite loop) via a DNS response containing a label pointer that references its own offset. Niels Provos libevent 1.2 y 1.2a permite a atacantes remotos provocar denegación de servicio (bucle infinito) a través de una respuesta DNS que contiene una puntero de etiqueta que referencia a su propio offset. • http://monkey.org/~provos/libevent •

CVE-2006-4292
https://notcve.org/view.php?id=CVE-2006-4292
22 Aug 2006 — Unspecified vulnerability in Niels Provos Honeyd before 1.5b allows remote attackers to cause a denial of service (application crash) via certain Address Resolution Protocol (ARP) packets. Vulnerabilidad no especificada en Niels Provos Honeyd anterior a 1.5b permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) mediante determinados paquetes ARP (Address Resolution Protocol). • http://secunia.com/advisories/21591 •

CVE-2006-0752
https://notcve.org/view.php?id=CVE-2006-0752
18 Feb 2006 — Niels Provos Honeyd before 1.5 replies to certain illegal IP packet fragments that other IP stack implementations would drop, which allows remote attackers to identify IP addresses that are being simulated using honeyd. • http://secunia.com/advisories/18867 •

CVE-2004-2012 – NetBSD/FreeBSD Port Systrace 1.x - Exit Routine Access Validation Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-2012
31 Dec 2004 — The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges. • https://www.exploit-db.com/exploits/24113 •

CVE-2004-2095
https://notcve.org/view.php?id=CVE-2004-2095
31 Dec 2004 — Honeyd before 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote attackers to identify IP addresses that are being simulated by Honeyd. • http://marc.info/?l=bugtraq&m=107471181426047&w=2 •