Freebsd

Freebsd

527 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Veröffentlicht 31.08.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

ipfw in FreeBSD does not properly handle the use of "me" in its rules when point to point interfaces are used, which causes ipfw to allow connections from arbitrary remote hosts.

  • EPSS 0.2%
  • Veröffentlicht 23.08.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.

  • EPSS 0.59%
  • Veröffentlicht 21.08.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

linprocfs on FreeBSD 4.3 and earlier does not properly restrict access to kernel memory, which allows one process with debugging rights on a privileged process to read restricted memory from that process.

  • EPSS 0.06%
  • Veröffentlicht 17.08.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

fts routines in FreeBSD 4.3 and earlier, NetBSD before 1.5.2, and OpenBSD 2.9 and earlier can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to p...

Exploit
  • EPSS 16.67%
  • Veröffentlicht 14.08.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 10.07.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to...

Exploit
  • EPSS 16.8%
  • Veröffentlicht 07.07.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets ...

  • EPSS 0.06%
  • Veröffentlicht 02.07.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

BubbleMon 1.31 does not properly drop group privileges before executing programs, which allows local users to execute arbitrary commands with the kmem group id.

  • EPSS 1.34%
  • Veröffentlicht 02.07.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

licq before 1.0.3 allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.

  • EPSS 0.99%
  • Veröffentlicht 27.06.2001 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

time server daemon timed allows remote attackers to cause a denial of service via malformed packets.