Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.1%
  • Veröffentlicht 11.09.2008 01:10:39
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ICMPv6 Multicast Listener Disco...

  • EPSS 5.84%
  • Veröffentlicht 05.09.2008 16:08:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote attackers to cause a den...

  • EPSS 0.29%
  • Veröffentlicht 05.09.2008 16:08:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Stack-based buffer overflow in sys/kern/vfs_mount.c in the kernel in FreeBSD 7.0 and 7.1, when vfs.usermount is enabled, allows local users to gain privileges via a crafted (1) mount or (2) nmount system call, related to copying of "user defined data...

  • EPSS 0.05%
  • Veröffentlicht 05.09.2008 16:08:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a tra...

Exploit
  • EPSS 19.06%
  • Veröffentlicht 27.03.2008 17:44:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to ...

Exploit
  • EPSS 0.43%
  • Veröffentlicht 09.03.2008 02:44:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via lon...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 15.02.2008 02:00:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.

  • EPSS 0.08%
  • Veröffentlicht 16.01.2008 02:00:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The ptsname function in FreeBSD 6.0 through 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the p...

  • EPSS 0.04%
  • Veröffentlicht 16.01.2008 02:00:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the us...

  • EPSS 0.08%
  • Veröffentlicht 30.11.2007 01:46:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 through 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms...