- EPSS 0.36%
- Published 05.08.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets...
CVE-2005-2218
- EPSS 0.07%
- Published 26.07.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
- EPSS 0.22%
- Published 05.07.2005 04:00:00
- Last modified 03.04.2025 01:03:51
ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache resul...
- EPSS 0.34%
- Published 05.07.2005 04:00:00
- Last modified 03.04.2025 01:03:51
FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
- EPSS 80.86%
- Published 31.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...
CVE-2005-1399
- EPSS 0.05%
- Published 06.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.
CVE-2005-1400
- EPSS 0.06%
- Published 06.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.
CVE-2005-1406
- EPSS 0.09%
- Published 06.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
- EPSS 1.23%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.
CVE-2005-0988
- EPSS 0.12%
- Published 02.05.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by gzip af...