CVE-2002-1963
- EPSS 0.06%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Linux kernel 2.4.1 through 2.4.19 sets root's NR_RESERVED_FILES limit to 10 files, which allows local users to cause a denial of service (resource exhaustion) by opening 10 setuid binaries.
CVE-2002-1976
- EPSS 0.13%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as...
CVE-2002-2254
- EPSS 0.08%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID...
CVE-2002-1380
- EPSS 0.18%
- Published 23.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
CVE-2002-1319
- EPSS 0.06%
- Published 11.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
CVE-2002-0429
- EPSS 0.08%
- Published 12.08.2002 04:00:00
- Last modified 03.04.2025 01:03:51
The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall).
CVE-2002-0499
- EPSS 0.46%
- Published 12.08.2002 04:00:00
- Last modified 03.04.2025 01:03:51
The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories.
- EPSS 1.04%
- Published 12.08.2002 04:00:00
- Last modified 03.04.2025 01:03:51
The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux.
CVE-2002-0704
- EPSS 1.08%
- Published 26.07.2002 04:00:00
- Last modified 03.04.2025 01:03:51
The Network Address Translation (NAT) capability for Netfilter ("iptables") 1.2.6a and earlier leaks translated IP addresses in ICMP error messages.
CVE-2002-0570
- EPSS 0.12%
- Published 03.07.2002 04:00:00
- Last modified 03.04.2025 01:03:51
The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.