Abuse Melding

Je hebt een klacht over de onderstaande posting:

14-09-2005, 01:40 door Anoniem

Ik wil niet lullig doen, maar zojuist viel de Securityfocus newsletter in m'n mailbox. De Linux-lekken van afgelopen week: 47. Linux Kernel Sendmsg() Local Buffer Overflow Vulnerability BugTraq ID: 14785 Remote: No Date Published: 2005-09-09 Relevant URL: http://www.securityfocus.com/bid/14785 Summary: Linux kernel is prone to a local buffer overflow vulnerability. The vulnerability affects 'sendmsg()' when malformed user-supplied data is copied from userland to kernel memory. A successful attack can allow a local attacker to trigger an overflow, which may lead to a denial of service condition due to memory corruption. Arbitrary code execution resulting in privilege escalation is possible as well. 49. Linux Kernel Raw_sendmsg() Kernel Memory Access Vulnerability BugTraq ID: 14787 Remote: No Date Published: 2005-09-09 Relevant URL: http://www.securityfocus.com/bid/14787 Summary: Linux Kernel is prone to a kernel memory access vulnerability. This issue affecting the ...

Beschrijf je klacht (Optioneel):

captcha