Freebsd

Freebsd

509 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.19%
  • Veröffentlicht 24.08.2006 01:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possi...

  • EPSS 0.63%
  • Veröffentlicht 02.06.2006 01:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Directory traversal vulnerability in smbfs smbfs on FreeBSD 4.10 up to 6.1 allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences. NOTE: this is similar to CVE-2006-1864, but this is a different implement...

  • EPSS 0.44%
  • Veröffentlicht 02.06.2006 01:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.

  • EPSS 0.07%
  • Veröffentlicht 20.04.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allow...

  • EPSS 0.05%
  • Veröffentlicht 23.03.2006 20:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 through 6.1-STABLE before 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root...

  • EPSS 1.2%
  • Veröffentlicht 23.03.2006 11:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows r...

  • EPSS 1.97%
  • Veröffentlicht 07.03.2006 02:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting mu...

  • EPSS 79.33%
  • Veröffentlicht 27.02.2006 19:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

nfsd in FreeBSD 6.0 kernel allows remote attackers to cause a denial of service via a crafted NFS mount request, as demonstrated by the ProtoVer NFS test suite.

  • EPSS 1.36%
  • Veröffentlicht 02.02.2006 11:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote attackers to cause a denial of service (infinite loop).

  • EPSS 0.07%
  • Veröffentlicht 25.01.2006 22:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.