Vulnerability & Exploit Database

Displaying entries 1 - 10 of 21 in total

Results for: CVE-2014-2893 Back to search

SUSE Linux Security Advisory: SUSE-SU-2014:1669-1 Vulnerability

  • Severity: 7
  • Published: December 17, 2014

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

SUSE: CVE-2014-2893: SUSE Linux Security Advisory Vulnerability

  • Severity: 2
  • Published: April 23, 2014

The GetHTMLRunDir function in the scan-build utility in Clang 3.5 and earlier allows local users to obtain sensitive information or overwrite arbitrary files via a symlink attack on temporary directories with predictable names.

DSA-2906-1 linux-2.6 -- privilege escalation/denial of service/information leak Vulnerability

  • Severity: 10
  • Published: March 24, 2014

net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.

SUSE Linux Security Vulnerability: CVE-2013-6466 Vulnerability

  • Severity: 5
  • Published: January 26, 2014

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

RHSA-2014:0185: openswan security update Vulnerability

  • Severity: 5
  • Published: January 26, 2014

Openswan is a free implementation of Internet Protocol Security (IPsec) andInternet Key Exchange (IKE). IPsec uses strong cryptography to provide bothauthentication and encryption services. These services allow you to buildsecure tunnels through untrusted networks.A NULL pointer dereference flaw was discovered in the way Openswan's IKEda...

Gentoo Linux: CVE-2013-6466: Openswan: Denial of Service Vulnerability

  • Severity: 5
  • Published: January 26, 2014

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

Cent OS: CVE-2013-6466: CESA-2014:0185 (openswan) Vulnerability

  • Severity: 5
  • Published: January 26, 2014

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

Alpine Linux: CVE-2013-6466: openswan remote DoS Vulnerability

  • Severity: 5
  • Published: January 26, 2014

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

USN-2050-1: Linux kernel (OMAP4) vulnerabilities Vulnerability

  • Severity: 7
  • Published: November 04, 2013

The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and...