Freebsd

Freebsd

503 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:24:01

`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file t...

  • EPSS 0.12%
  • Veröffentlicht 15.02.2024 05:15:11
  • Zuletzt bearbeitet 04.06.2025 21:55:22

The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail. Attacker can get information about TTYs allocated on the host or in other...

  • EPSS 0.18%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 09.12.2024 17:27:22

A user-provided integer option was passed to nmreq_copyin() without checking if it would overflow. This insufficient bounds checking could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privilege...

  • EPSS 0.24%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 09.12.2024 23:24:03

Handlers for *_CFG_PAGE read / write ioctls in the mpr, mps, and mpt drivers allocated a buffer of a caller-specified size, but copied to it a fixed size header. Other heap content would be overwritten if the specified size was too small. Users wit...

  • EPSS 0.11%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 27.03.2025 20:15:16

The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1...

  • EPSS 7.85%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 22:16:17

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame ma...

  • EPSS 0.06%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 21:11:31

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...

  • EPSS 0.04%
  • Veröffentlicht 15.02.2024 05:15:08
  • Zuletzt bearbeitet 09.12.2024 17:27:41

The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_...

Exploit
  • EPSS 0.84%
  • Veröffentlicht 24.12.2023 06:15:07
  • Zuletzt bearbeitet 21.11.2024 08:38:44

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...

Medienbericht Exploit
  • EPSS 64.06%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 29.09.2025 21:56:10

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...