Show filters
52 Total Results
Displaying 1-10 of 52
Sort by:
Attacker Value
Unknown
CVE-2008-1673
Disclosure Date: June 10, 2008 (last updated October 04, 2023)
The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
0
Attacker Value
Unknown
CVE-2007-6694
Disclosure Date: January 29, 2008 (last updated October 04, 2023)
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2006-4814
Disclosure Date: December 20, 2006 (last updated October 04, 2023)
The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
0
Attacker Value
Unknown
CVE-2006-3741
Disclosure Date: October 10, 2006 (last updated October 04, 2023)
The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).
0
Attacker Value
Unknown
CVE-2006-2071
Disclosure Date: April 27, 2006 (last updated October 04, 2023)
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
0
Attacker Value
Unknown
CVE-2006-1242
Disclosure Date: March 15, 2006 (last updated February 22, 2025)
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
0
Attacker Value
Unknown
CVE-2006-0096
Disclosure Date: January 06, 2006 (last updated February 22, 2025)
wan/sdla.c in Linux kernel 2.6.x before 2.6.11 and 2.4.x before 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels.
0
Attacker Value
Unknown
CVE-2005-4798
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.
0
Attacker Value
Unknown
CVE-2005-0489
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory.
0
Attacker Value
Unknown
CVE-2005-4635
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages.
0