Freebsd

Freebsd

509 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.61%
  • Veröffentlicht 29.04.2020 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:39

In FreeBSD 12.1-STABLE before r356035, 12.1-RELEASE before 12.1-RELEASE-p4, 11.3-STABLE before r356036, and 11.3-RELEASE before 11.3-RELEASE-p8, incomplete packet data validation may result in memory access after it has been freed leading to a kernel...

  • EPSS 0.61%
  • Veröffentlicht 29.04.2020 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:45:14

In FreeBSD 12.1-STABLE before r356035, 12.1-RELEASE before 12.1-RELEASE-p4, 11.3-STABLE before r356036, and 11.3-RELEASE before 11.3-RELEASE-p8, incomplete packet data validation may result in accessing out-of-bounds memory leading to a kernel panic ...

  • EPSS 0.12%
  • Veröffentlicht 28.04.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:29:39

In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has s...

  • EPSS 0.05%
  • Veröffentlicht 28.04.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 04:29:39

In FreeBSD 12.1-STABLE before r356606 and 12.1-RELEASE before 12.1-RELEASE-p3, driver specific ioctl command handlers in the ixl network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to trigger update...

  • EPSS 0.21%
  • Veröffentlicht 28.04.2020 20:15:12
  • Zuletzt bearbeitet 21.11.2024 05:37:10

In FreeBSD 12.1-STABLE before r358739, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r358740, and 11.3-RELEASE before 11.3-RELEASE-p7, a TCP SYN-ACK or challenge TCP-ACK segment over IPv6 that is transmitted or retransmitted does not proper...

Exploit
  • EPSS 67.31%
  • Veröffentlicht 21.04.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:45

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occur...

  • EPSS 0.14%
  • Veröffentlicht 14.03.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:35

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary re...

  • EPSS 0.23%
  • Veröffentlicht 14.03.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:35

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, mishandles font loading by a guest through a grub2.cfg file, leading to a buffer overflow.

  • EPSS 0.94%
  • Veröffentlicht 20.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 01:44:35

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393.

  • EPSS 0.94%
  • Veröffentlicht 20.02.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 01:44:36

The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries.