Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.15%
  • Veröffentlicht 15.03.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

FreeBSD 5.1 and earlier, and Mac OS X before 10.3.4, allows remote attackers to cause a denial of service (resource exhaustion of memory buffers and system crash) via a large number of out-of-sequence TCP packets, which prevents the operating system ...

  • EPSS 1.27%
  • Veröffentlicht 03.03.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The TCP MSS (maximum segment size) functionality in netinet allows remote attackers to cause a denial of service (resource exhaustion) via (1) a low MTU, which causes a large number of small packets to be produced, or (2) via a large number of packet...

  • EPSS 0.07%
  • Veröffentlicht 03.03.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

mksnap_ffs in FreeBSD 5.1 and 5.2 only sets the snapshot flag when creating a snapshot for a file system, which causes default values for other flags to be used, possibly disabling security-critical settings and allowing a local user to bypass intend...

  • EPSS 0.33%
  • Veröffentlicht 03.03.2004 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails,...

  • EPSS 0.07%
  • Veröffentlicht 31.12.2003 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Integer overflow in the f_count counter in FreeBSD before 4.2 through 5.0 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via multiple calls to (1) fpathconf and (2) lseek, which do not properly decrement f...

  • EPSS 29.9%
  • Veröffentlicht 15.12.2003 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.

  • EPSS 0.74%
  • Veröffentlicht 17.11.2003 05:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The arplookup function in FreeBSD 5.1 and earlier, Mac OS X before 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP request...

  • EPSS 1.71%
  • Veröffentlicht 20.10.2003 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that caus...

  • EPSS 76.08%
  • Veröffentlicht 06.10.2003 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.

Exploit
  • EPSS 90.83%
  • Veröffentlicht 27.08.2003 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to tr...