CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
linprocfs on FreeBSD 4.3 and earlier does not properly restrict access to kernel memory, which allows one process with debugging rights on a privileged process to read restricted memory from that process. |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. |
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. |
IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash. |
Vacation program allows command execution by remote users through a sendmail command. |
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. |
Sendmail decode alias can be used to overwrite sensitive files. |
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. |
Local users can start Sendmail in daemon mode and gain root privileges. |
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. |
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. |
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. |
Buffer overflow in FreeBSD lpd through long DNS hostnames. |
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections. |
The open() function in FreeBSD allows local attackers to write to arbitrary files. |
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems. |
A buffer overflow in lsof allows local users to obtain root privilege. |
IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors. |
The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncookies that causes a null pointer to be referenced for the socket's TCP options, or (2) by killing and restarting a process that listens on the same socket, which does not properly clear the old inpcb pointer on restart. |