Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.44%
  • Veröffentlicht 02.06.2006 01:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.

  • EPSS 0.06%
  • Veröffentlicht 20.04.2006 10:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allow...

  • EPSS 0.05%
  • Veröffentlicht 23.03.2006 20:06:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 through 6.1-STABLE before 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root...

  • EPSS 1.2%
  • Veröffentlicht 23.03.2006 11:06:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows r...

  • EPSS 1.97%
  • Veröffentlicht 07.03.2006 02:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting mu...

  • EPSS 79.33%
  • Veröffentlicht 27.02.2006 19:06:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

nfsd in FreeBSD 6.0 kernel allows remote attackers to cause a denial of service via a crafted NFS mount request, as demonstrated by the ProtoVer NFS test suite.

  • EPSS 1.56%
  • Veröffentlicht 02.02.2006 11:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote attackers to cause a denial of service (infinite loop).

  • EPSS 0.07%
  • Veröffentlicht 25.01.2006 22:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.

  • EPSS 0.08%
  • Veröffentlicht 25.01.2006 22:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

A logic error in FreeBSD kernel 5.4-STABLE and 6.0 causes the kernel to calculate an incorrect buffer length, which causes more data to be copied to userland than intended, which could allow local users to read portions of kernel memory.

  • EPSS 5.15%
  • Veröffentlicht 25.01.2006 22:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via craft...