Freebsd

Freebsd

503 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 20.12%
  • Published 27.03.2008 17:44:00
  • Last modified 09.04.2025 00:30:58

Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to ...

Exploit
  • EPSS 0.4%
  • Published 09.03.2008 02:44:00
  • Last modified 09.04.2025 00:30:58

Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via lon...

Exploit
  • EPSS 0.07%
  • Published 15.02.2008 02:00:00
  • Last modified 09.04.2025 00:30:58

The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.

  • EPSS 0.07%
  • Published 16.01.2008 02:00:00
  • Last modified 09.04.2025 00:30:58

The ptsname function in FreeBSD 6.0 through 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the p...

  • EPSS 0.04%
  • Published 16.01.2008 02:00:00
  • Last modified 09.04.2025 00:30:58

The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the us...

  • EPSS 0.07%
  • Published 30.11.2007 01:46:00
  • Last modified 09.04.2025 00:30:58

The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 through 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms...

Exploit
  • EPSS 72.12%
  • Published 16.07.2007 22:30:00
  • Last modified 09.04.2025 00:30:58

Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.

  • EPSS 0.07%
  • Published 12.07.2007 16:30:00
  • Last modified 09.04.2025 00:30:58

The ULE process scheduler in the FreeBSD kernel gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without...

  • EPSS 0.07%
  • Published 12.07.2007 16:30:00
  • Last modified 09.04.2025 00:30:58

The 4BSD process scheduler in the FreeBSD kernel performs scheduling based on CPU billing gathered from periodic process sampling ticks, which allows local users to cause a denial of service (CPU consumption) by performing voluntary nanosecond sleeps...

  • EPSS 0.46%
  • Published 17.01.2007 00:28:00
  • Last modified 09.04.2025 00:30:58

The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users to cause a denial of service (kernel panic) and possibly corrupt other filesystems by mounting a crafted UNIX File System (UFS) DMG image that contains a corrup...