Slackware

Slackware Linux

54 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.24%
  • Veröffentlicht 07.07.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.

  • EPSS 1.9%
  • Veröffentlicht 05.01.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

CVS server before 1.11.10 may allow attackers to cause the CVS server to create directories and files in the file system root directory via malformed module requests.

  • EPSS 41.87%
  • Veröffentlicht 15.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap-based buffer overflow in rsync before 2.5.7, when running in server mode, allows remote attackers to execute arbitrary code and possibly escape the chroot jail.

Exploit
  • EPSS 16.37%
  • Veröffentlicht 16.06.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

CUPS before 1.1.19 allows remote attackers to cause a denial of service via a partial printing request to the IPP port (631), which does not time out.

  • EPSS 0.49%
  • Veröffentlicht 22.05.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

rc.M in Slackware 9.0 calls quotacheck with the -M option, which causes the filesystem to be remounted and possibly reset security-relevant mount flags such as nosuid, nodev, and noexec.

Exploit
  • EPSS 0.25%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in efstools in Bonobo, when installed setuid, allows local users to execute arbitrary code via long command line arguments.

Exploit
  • EPSS 0.27%
  • Veröffentlicht 27.02.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

GNU locate in findutils 4.1 on Slackware 7.1 and 8.0 allows local users to gain privileges via an old formatted filename database (locatedb) that contains an entry with an out-of-range offset, which causes locate to write to arbitrary process memory.

  • EPSS 0.44%
  • Veröffentlicht 12.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.

  • EPSS 0.32%
  • Veröffentlicht 12.03.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.