Vulnerabilities > Linux > Linux Kernel > 2.4.1

DATE CVE VULNERABILITY TITLE RISK
2003-01-17 CVE-2003-0001 Information Exposure vulnerability in multiple products
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
network
low complexity
freebsd linux microsoft netbsd CWE-200
5.0
2002-12-31 CVE-2002-2254 Permissions, Privileges, and Access Controls vulnerability in Linux Kernel
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.
local
low complexity
linux CWE-264
2.1
2002-12-31 CVE-2002-1976 Unspecified vulnerability in Linux Kernel
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap.
local
low complexity
linux
2.1
2002-12-31 CVE-2002-1963 Unspecified vulnerability in Linux Kernel
Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries.
local
low complexity
linux
2.1
2002-12-11 CVE-2002-1319 Denial Of Service vulnerability in Linux Kernel 2.4 System Call TF Flag
The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
local
low complexity
linux trustix
2.1
2002-08-12 CVE-2002-0510 Unspecified vulnerability in Linux Kernel
The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux.
network
low complexity
linux
5.0
2002-08-12 CVE-2002-0499 Unspecified vulnerability in Linux Kernel
The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories.
local
low complexity
linux
2.1
2002-07-03 CVE-2002-0570 Unspecified vulnerability in Linux Kernel
The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
local
low complexity
linux
2.1
2001-12-31 CVE-2001-1572 Unspecified vulnerability in Linux Kernel
The MAC module in Netfilter in Linux kernel 2.4.1 through 2.4.11, when configured to filter based on MAC addresses, allows remote attackers to bypass packet filters via small packets.
network
low complexity
linux
7.5
2001-10-18 CVE-2001-0907 Denial of Service vulnerability in Linux Deep Symbolic Link
Linux kernel 2.2.1 through 2.2.19, and 2.4.1 through 2.4.10, allows local users to cause a denial of service via a series of deeply nested symlinks, which causes the kernel to spend extra time when trying to access the link.
local
low complexity
linux
2.1