Page 12 of 90 results (0.012 seconds)

CVSS: 7.8EPSS: 14%CPEs: 9EXPL: 0

The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. El protocolo IPv6 permite a atacantes remotos provocar una denegación de servicio mediante cabeceras IPv6 de enrutamiento de tipo 0 (IPV6_RTHDR_TYPE_0) lo cual provoca amplificación de la red entre dos enrutadores. • http://docs.info.apple.com/article.html?artnum=305712 http://docs.info.apple.com/article.html?artnum=306375 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html http://openbsd.org/errata39.html#022_route6 http://openbsd.org/errata40.html#012_route6 http://secunia.com/advisories/24978 http://secunia.com/advisories/25033 http://secunia.com/advisories/25068 http://secunia.com/advisories/25083 http://secunia.com/advisories/25288 http://secunia.com/advisories/25 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in eject.c in Jason W. Bacon mcweject 0.9 on FreeBSD, and possibly other versions, allows local users to execute arbitrary code via a long command line argument, possibly involving the device name. Desbordamiento de búfer en eject.c de Jason W. Bacon mcweject 0.9 en FreeBSD, y posiblemente otras versiones, permite a usuarios locales ejecutar código de su elección mediante un argumento largo de línea de comandos, posiblemente implicando el nombre de dispositivo. • https://www.exploit-db.com/exploits/3578 http://secunia.com/advisories/24641 http://www.vupen.com/english/advisories/2007/1125 https://exchange.xforce.ibmcloud.com/vulnerabilities/33212 •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 1

The jail rc.d script in FreeBSD 5.3 up to 6.2 does not verify pathnames when writing to /var/log/console.log during a jail start-up, or when file systems are mounted or unmounted, which allows local root users to overwrite arbitrary files, or mount/unmount files, outside of the jail via a symlink attack. El script de cárcel rc.d en FreeBSD 5.3 hasta to 6.2 no verifica nombres de ruta cuando escribe en /var/log/console.log durante un arranque de cárcel, o cuando ficheros del sistema están montados o desmontados, lo cual permite a atacantes remotos sobre-escribir ficheros de su elección, o montar y desmontar ficheros, fuera de la cárcel mediante un ataque de enlaces simbólicos • http://osvdb.org/32726 http://secunia.com/advisories/23730 http://security.freebsd.org/advisories/FreeBSD-SA-07:01.jail.asc http://securitytracker.com/id?1017505 http://www.securityfocus.com/bid/22011 •

CVSS: 4.4EPSS: 0%CPEs: 3EXPL: 0

Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability ** IMPUGNADO ** Desbordamiento de entero en banner/banner.c de FreeBSD, NetBSD, y OpenBSD podría permitir a usuarios locales modificar la memoria mediante un banner largo. NOTA: CVE y múltiples terceras partes impugnan esta vulnerabilidad. Dado que banner no es un stuid, un exploit no podría cruzar límites de privilegios en operaciones normales. • http://www.securityfocus.com/archive/1/452322/100/200/threaded http://www.securityfocus.com/archive/1/452330/100/200/threaded http://www.securityfocus.com/archive/1/452374/100/200/threaded http://www.securityfocus.com/archive/1/452470/100/200/threaded •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

ld.so in FreeBSD, NetBSD, and possibly other BSD distributions does not remove certain harmful environment variables, which allows local users to gain privileges by passing certain environment variables to loading processes. NOTE: this issue has been disputed by a third party, stating that it is the responsibility of the application to properly sanitize the environment ** IMPUGNADA ** ld.so en FreeBSD, NetBSD, u posiblemente otras distribuciones BSD no borran ciertas variables de entorno perjudiciales, lo cual permite a usuarios locales obtener privilegios pasando cierta variables de entorno a procesos de carga. NOTA: este asunto ha sido impugnado por una tercera parte, afirmando que es responsabilidad de la aplicación limpiar adecuadamente el entorno. • http://www.securityfocus.com/archive/1/452371/100/0/threaded http://www.securityfocus.com/archive/1/452428/100/0/threaded •