Netbsd

Netbsd

168 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 38.41%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

NetBSD maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled, this allows attackers to more easily manipulate memory leading to arbitrary code execution. This affects NetBSD 7.1 and possibly earlier versions.

  • EPSS 3.98%
  • Published 19.06.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

The NetBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack m...

Exploit
  • EPSS 7.27%
  • Published 20.01.2017 15:59:00
  • Last modified 20.04.2025 01:37:25

mail.local in NetBSD versions 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows local users to change ownership of or append data to arbitrary files on the target system via a symlink attack on the user mailbox.

  • EPSS 2.15%
  • Published 19.01.2017 20:59:00
  • Last modified 20.04.2025 01:37:25

CGI handling flaw in bozohttpd in NetBSD 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows remote attackers to execute arbitrary code via crafted arguments, which are handled by a non-CGI aware program.

  • EPSS 3.73%
  • Published 12.12.2014 03:03:47
  • Last modified 12.04.2025 10:46:40

The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets...

  • EPSS 85.18%
  • Published 17.11.2014 16:59:05
  • Last modified 12.04.2025 10:46:40

The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an H...

  • EPSS 94.02%
  • Published 15.10.2014 00:55:02
  • Last modified 12.04.2025 10:46:40

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

  • EPSS 0.41%
  • Published 21.08.2014 22:55:03
  • Last modified 12.04.2025 10:46:40

The HZ module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted argument to the iconv_open function. NOTE: this issue was SPLIT p...

  • EPSS 0.41%
  • Published 21.08.2014 22:55:03
  • Last modified 12.04.2025 10:46:40

The VIQR module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (out-of-bounds array access) via a crafted argument to the iconv_open function. NOTE: this issue was SPL...

  • EPSS 0.57%
  • Published 24.07.2014 14:55:09
  • Last modified 12.04.2025 10:46:40

bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.