Show filters
335 Total Results
Displaying 311-320 of 335
Sort by:
Attacker Value
Unknown

CVE-2011-1526

Disclosure Date: July 11, 2011 (last updated October 04, 2023)
ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
0
Attacker Value
Unknown

CVE-2010-4160

Disclosure Date: January 07, 2011 (last updated October 04, 2023)
Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
0
Attacker Value
Unknown

CVE-2010-4164

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
0
Attacker Value
Unknown

CVE-2010-3876

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
0
Attacker Value
Unknown

CVE-2010-4162

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
0
Attacker Value
Unknown

CVE-2010-3850

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
0
Attacker Value
Unknown

CVE-2010-4158

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
0
Attacker Value
Unknown

CVE-2010-4258

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
0
Attacker Value
Unknown

CVE-2010-3848

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
0
Attacker Value
Unknown

CVE-2010-3849

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
0