Freebsd

Freebsd

515 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 11.01.2006 21:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.

Exploit
  • EPSS 0.13%
  • Veröffentlicht 31.12.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while th...

  • EPSS 0.36%
  • Veröffentlicht 05.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets...

  • EPSS 0.07%
  • Veröffentlicht 26.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.

  • EPSS 0.22%
  • Veröffentlicht 05.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache resul...

  • EPSS 0.34%
  • Veröffentlicht 05.07.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.

Exploit
  • EPSS 81.53%
  • Veröffentlicht 31.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...

  • EPSS 0.05%
  • Veröffentlicht 06.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.

  • EPSS 0.06%
  • Veröffentlicht 06.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.

  • EPSS 0.09%
  • Veröffentlicht 06.05.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.