Freebsd

Freebsd

509 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 27.03.2025 20:15:16

The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1...

  • EPSS 7.85%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 22:16:17

The 802.11 beacon handling routine failed to validate the length of an IEEE 802.11s Mesh ID before copying it to a heap-allocated buffer. While a FreeBSD Wi-Fi client is in scanning mode (i.e., not associated with a SSID) a malicious beacon frame ma...

  • EPSS 0.06%
  • Veröffentlicht 15.02.2024 05:15:09
  • Zuletzt bearbeitet 04.06.2025 21:11:31

When dumping core and saving process information, proc_getargv() might return an sbuf which have a sbuf_len() of 0 or -1, which is not properly handled. An out-of-bound read can happen when user constructs a specially crafted ps_string, which in tur...

  • EPSS 0.05%
  • Veröffentlicht 15.02.2024 05:15:08
  • Zuletzt bearbeitet 09.12.2024 17:27:41

The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_...

Exploit
  • EPSS 0.84%
  • Veröffentlicht 24.12.2023 06:15:07
  • Zuletzt bearbeitet 21.11.2024 08:38:44

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occu...

Medienbericht Exploit
  • EPSS 55.96%
  • Veröffentlicht 18.12.2023 16:15:10
  • Zuletzt bearbeitet 04.11.2025 22:15:55

The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client a...

  • EPSS 0.26%
  • Veröffentlicht 13.12.2023 09:15:34
  • Zuletzt bearbeitet 21.11.2024 08:44:02

In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers.  This could allow a malicious a...

  • EPSS 0.3%
  • Veröffentlicht 13.12.2023 09:15:34
  • Zuletzt bearbeitet 21.11.2024 08:44:18

When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data ...

  • EPSS 0.87%
  • Veröffentlicht 08.11.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:49

In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write...

  • EPSS 0.16%
  • Veröffentlicht 08.11.2023 09:15:07
  • Zuletzt bearbeitet 21.11.2024 08:42:54

In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints.  When only a list of resolvable domain...