Примеры использования Local attacker на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
A local attacker on a system with the rds module loaded could possibly use this for denial of service.
Heap-based buffer overflow by converting list of controllers for given task into an array of strings could lead to privilege escalation by a local attacker.
A local attacker could use this flaw to cause a bus-activated service that is not currently running to attempt to start,
A local attacker with access to a LXC container could exploit this flaw to run programs inside the container that are not confined by AppArmor
the vulnerability allows a local attacker to overwrite arbitrary files the users has write permissions for,
allowing a local attacker with access to/dev/mem to obtain sensitive information
not properly initialize memory, potentially allowing a local attacker to obtain sensitive information from uninitialized kernel memory via a crafted ioctl call.
not properly initialize memory, potentially allowing a local attacker to obtain sensitive information from uninitialized kernel memory via a crafted ioctl call.
which may allow a local attacker to read this password(which provides access to all backed-up files) from the process listing.
which may allow a local attacker to read this password from the process listing.
This could allow local attackers to recover RSA private keys.
A denial-of-service vulnerability in dbus-daemon allowed local attackers to prevent new connections to dbus-daemon, or disconnect existing clients, by exhausting descriptor limits.
which may allow local attackers to gain root access when/tmp is mounted without the noexec option.
The issue is that the LD_POINTER_GUARD in the environment is not sanitized allowing local attackers easily to bypass the pointer guarding protection on set-user-ID and set-group-ID programs.
In the vserver-enabled kernels, a missing access check on certain symlinks in/proc enabled local attackers to access resources in other vservers CVE-2008-0163.
It was discovered that due to incorrect permissions masks when creating directories, local attackers could potentially execute arbitrary code
allowing local attackers to gain additional privileges.
uses insecure permissions on its unix domain control socket which enables local attackers to issue commands to multipathd prevent access to storage devices
In total we have 146 bits, that are guaranteed to be inaccessible even to a local attacker.
An SCTP denial-of-service was discovered which can be triggered by a local attacker during a heartbeat timeout event after the 4-way handshake.