Freebsd

Freebsd

515 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 28.05.2010 18:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

jail.c in jail in FreeBSD 8.0 and 8.1-PRERELEASE, when the "-l -U root" options are omitted, does not properly restrict access to the current working directory, which might allow local users to read, modify, or create arbitrary files via standard fil...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2010 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The replay functionality for ZFS Intent Log (ZIL) in FreeBSD 7.1, 7.2, and 8.0, when creating files during replay of a setattr transaction, uses 7777 permissions instead of the original permissions, which might allow local users to read or modify una...

  • EPSS 0.05%
  • Veröffentlicht 20.12.2009 02:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) f...

Exploit
  • EPSS 12.58%
  • Veröffentlicht 02.12.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1 and 8.0 does not clear the (1) LD_LIBMAP, (2) LD_LIBRARY_PATH, (3) LD_LIBMAP_DISABLE, (4) LD_DEBUG, and (5) LD_ELF_HINTS_PATH environment variables, which...

Exploit
  • EPSS 18.17%
  • Veröffentlicht 02.12.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The _rtld function in the Run-Time Link-Editor (rtld) in libexec/rtld-elf/rtld.c in FreeBSD 7.1, 7.2, and 8.0 does not clear the LD_PRELOAD environment variable, which allows local users to gain privileges by executing a setuid or setguid program wit...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 06.10.2009 22:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Race condition in the Pipe (IPC) close function in FreeBSD 6.3 and 6.4 allows local users to cause a denial of service (crash) or gain privileges via vectors related to kqueues, which triggers a use after free, leading to a NULL pointer dereference o...

  • EPSS 0.3%
  • Veröffentlicht 30.07.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev is available, allows local users to cause a denial of service (kernel panic) via a certain IOCTL request with a large count, which triggers a malloc call with a large value.

Exploit
  • EPSS 41.76%
  • Veröffentlicht 01.07.2009 13:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD...

  • EPSS 0.04%
  • Veröffentlicht 25.06.2009 02:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

FreeBSD 6.3, 6.4, 7.1, and 7.2 does not enforce permissions on the SIOCSIFINFO_IN6 IOCTL, which allows local users to modify or disable IPv6 network interfaces, as demonstrated by modifying the MTU.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 18.06.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address...