Freebsd

Freebsd

509 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 12.09.2018 14:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:26

In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p3, 11.1-RELEASE-p14, 10.4-STABLE, and 10.4-RELEASE-p12, insufficient validation in the ELF header parser could allow a malicious ELF binary to cause a kernel crash or disclose kernel memory.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 12.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:21:18

In FreeBSD 11.x before 11.1-RELEASE and 10.x before 10.4-RELEASE, the qsort algorithm has a deterministic recursion pattern. Feeding a pathological input to the algorithm can lead to excessive stack usage and potential overflow. Applications that use...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 12.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:21:18

In FreeBSD before 11.2-RELEASE, a stack guard-page is available but is disabled by default. This results in the possibility a poorly written process could be cause a stack overflow.

Exploit
  • EPSS 24.45%
  • Veröffentlicht 12.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:21:18

In FreeBSD before 11.2-RELEASE, multiple issues with the implementation of the stack guard-page reduce the protections afforded by the guard-page. This results in the possibility a poorly written process could be cause a stack overflow.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 12.09.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:21:18

In FreeBSD before 11.2-RELEASE, an application which calls setrlimit() to increase RLIMIT_STACK may turn a read-only memory region below the stack into a read-write region. A specially crafted executable could be exploited to execute arbitrary code i...

  • EPSS 1.82%
  • Veröffentlicht 04.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary i...

  • EPSS 0.7%
  • Veröffentlicht 09.08.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:11:25

One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing ...

  • EPSS 1.63%
  • Veröffentlicht 13.07.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 02:56:21

Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an attacker to read or write from memory. The full impact and severity depends on the method of exploit and how the library is u...

  • EPSS 1.26%
  • Veröffentlicht 21.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:05:51

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

Exploit
  • EPSS 2.53%
  • Veröffentlicht 04.06.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:00:29

An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate repl...