CVE-2020-26142
- EPSS 1.56%
- Veröffentlicht 11.05.2021 20:15:08
- Zuletzt bearbeitet 21.11.2024 05:19:21
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
CVE-2020-16088
- EPSS 0.16%
- Veröffentlicht 28.07.2020 12:15:12
- Zuletzt bearbeitet 21.11.2024 05:06:44
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
CVE-2011-3336
- EPSS 24.64%
- Veröffentlicht 12.02.2020 20:15:13
- Zuletzt bearbeitet 21.11.2024 01:30:17
regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.
CVE-2019-19726
- EPSS 9.14%
- Veröffentlicht 12.12.2019 01:15:10
- Zuletzt bearbeitet 21.11.2024 04:35:15
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_e...
CVE-2019-14899
- EPSS 0.06%
- Veröffentlicht 11.12.2019 15:15:14
- Zuletzt bearbeitet 21.11.2024 04:27:38
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiti...
CVE-2012-1577
- EPSS 0.91%
- Veröffentlicht 10.12.2019 19:15:14
- Zuletzt bearbeitet 21.11.2024 01:37:14
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
CVE-2019-19519
- EPSS 0.1%
- Veröffentlicht 05.12.2019 00:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:52
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
CVE-2019-19520
- EPSS 2.23%
- Veröffentlicht 05.12.2019 00:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:52
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
CVE-2019-19521
- EPSS 0.54%
- Veröffentlicht 05.12.2019 00:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:52
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c)...
CVE-2019-19522
- EPSS 0.2%
- Veröffentlicht 05.12.2019 00:15:11
- Zuletzt bearbeitet 21.11.2024 04:34:52
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey...