Show filters
206 Total Results
Displaying 181-190 of 206
Sort by:
Attacker Value
Unknown
CVE-2005-2872
Disclosure Date: September 09, 2005 (last updated February 22, 2025)
The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
0
Attacker Value
Unknown
CVE-2005-2873
Disclosure Date: September 09, 2005 (last updated February 22, 2025)
The ipt_recent kernel module (ipt_recent.c) in Linux kernel 2.6.12 and earlier does not properly perform certain time tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early, a different vulnerability than CVE-2005-2872.
0
Attacker Value
Unknown
CVE-2005-2800
Disclosure Date: September 06, 2005 (last updated February 22, 2025)
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
0
Attacker Value
Unknown
CVE-2005-2099
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.
0
Attacker Value
Unknown
CVE-2005-2458
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
0
Attacker Value
Unknown
CVE-2005-2459
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458.
0
Attacker Value
Unknown
CVE-2005-2457
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
0
Attacker Value
Unknown
CVE-2005-2098
Disclosure Date: August 23, 2005 (last updated February 22, 2025)
The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.
0
Attacker Value
Unknown
CVE-2005-2555
Disclosure Date: August 16, 2005 (last updated February 22, 2025)
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
0
Attacker Value
Unknown
CVE-2005-1263
Disclosure Date: May 11, 2005 (last updated February 22, 2025)
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
0