Vulnerabilities > Linux > Linux Kernel > 2.4.17
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2003-08-27 | CVE-2003-0462 | A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash). | 1.2 |
2003-07-25 | CVE-2003-0643 | Denial-Of-Service vulnerability in kernel Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash). | 2.1 |
2003-06-16 | CVE-2003-0246 | Unspecified vulnerability in Linux Kernel The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports. | 3.6 |
2003-03-31 | CVE-2003-0127 | Unspecified vulnerability in Linux Kernel The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel. | 7.2 |
2003-01-17 | CVE-2003-0001 | Information Exposure vulnerability in multiple products Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. | 5.0 |
2002-12-31 | CVE-2002-2254 | Permissions, Privileges, and Access Controls vulnerability in Linux Kernel The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted. | 2.1 |
2002-12-31 | CVE-2002-1976 | Unspecified vulnerability in Linux Kernel ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap. | 2.1 |
2002-12-31 | CVE-2002-1963 | Unspecified vulnerability in Linux Kernel Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries. | 2.1 |
2002-12-11 | CVE-2002-1319 | Denial Of Service vulnerability in Linux Kernel 2.4 System Call TF Flag The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs. | 2.1 |
2002-08-12 | CVE-2002-0510 | Unspecified vulnerability in Linux Kernel The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux. | 5.0 |