Freebsd

Freebsd

503 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Published 05.08.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets...

  • EPSS 0.07%
  • Published 26.07.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.

  • EPSS 0.22%
  • Published 05.07.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache resul...

  • EPSS 0.34%
  • Published 05.07.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.

Exploit
  • EPSS 80.86%
  • Published 31.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...

  • EPSS 0.05%
  • Published 06.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.

  • EPSS 0.06%
  • Published 06.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.

  • EPSS 0.09%
  • Published 06.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

  • EPSS 1.23%
  • Published 02.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

  • EPSS 0.12%
  • Published 02.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip af...