Show filters
82 Total Results
Displaying 11-20 of 82
Sort by:
Attacker Value
Unknown
CVE-2005-0489
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory.
0
Attacker Value
Unknown
CVE-2005-4635
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages.
0
Attacker Value
Unknown
CVE-2005-3660
Disclosure Date: December 22, 2005 (last updated February 22, 2025)
Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference.
0
Attacker Value
Unknown
CVE-2005-3806
Disclosure Date: November 25, 2005 (last updated February 22, 2025)
The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.
0
Attacker Value
Unknown
CVE-2005-2709
Disclosure Date: November 20, 2005 (last updated February 22, 2025)
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
0
Attacker Value
Unknown
CVE-2005-2708
Disclosure Date: October 25, 2005 (last updated February 22, 2025)
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.
0
Attacker Value
Unknown
CVE-2005-3273
Disclosure Date: October 21, 2005 (last updated February 22, 2025)
The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.
0
Attacker Value
Unknown
CVE-2005-3275
Disclosure Date: October 21, 2005 (last updated February 22, 2025)
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
0
Attacker Value
Unknown
CVE-2005-2553
Disclosure Date: August 12, 2005 (last updated February 22, 2025)
The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.
0
Attacker Value
Unknown
CVE-2005-1768
Disclosure Date: July 11, 2005 (last updated February 22, 2025)
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
0