Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 prior to 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.6.0 |
||
linux linux kernel 2.6.10 |
||
linux linux kernel 2.6.11 |
||
linux linux kernel 2.6.11.11 |
||
linux linux kernel 2.6.12 |
||
linux linux kernel 2.6.11.5 |
||
linux linux kernel 2.6.11.6 |
||
linux linux kernel 2.6.2 |
||
linux linux kernel 2.6.7 |
||
linux linux kernel 2.6.8 |
||
linux linux kernel 2.6.1 |
||
linux linux kernel 2.6.5 |
||
linux linux kernel 2.6.6 |
||
linux linux kernel 2.6.9 |
||
linux linux kernel 2.6_test9_cvs |
||
linux linux kernel 2.6.11.7 |
||
linux linux kernel 2.6.11.8 |
||
linux linux kernel 2.6.3 |
||
linux linux kernel 2.6.4 |