Page 12 of 67 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

OpenBSD 2.9 through 3.1 allows local users to cause a denial of service (resource exhaustion) and gain root privileges by filling the kernel's file descriptor table and closing file descriptors 0, 1, or 2 before executing a privileged process, which is not properly handled when OpenBSD fails to open an alternate descriptor. • http://online.securityfocus.com/archive/1/271702 http://www.iss.net/security_center/static/9048.php http://www.kb.cert.org/vuls/id/314963 http://www.openbsd.org/errata.html#fdalloc2 http://www.osvdb.org/5114 http://www.osvdb.org/5715 http://www.securityfocus.com/bid/4708 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron. • https://www.exploit-db.com/exploits/21373 http://marc.info/?l=bugtraq&m=101855467811695&w=2 http://online.securityfocus.com/archive/1/267089 http://www.iss.net/security_center/static/8818.php http://www.openbsd.org/errata30.html#mail http://www.osvdb.org/5269 http://www.securityfocus.com/bid/4495 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL. PF en OpenBSD 3.0 con la regla return-rst establece el TTL (Time to Live) a 128 en el paquete RST, lo que permite a atacantes remotos determinar si un puerto está siendo filtrado porque el TTL es diferente del de por defecto. • http://www.iss.net/security_center/static/8738.php http://www.securityfocus.com/archive/1/265188 http://www.securityfocus.com/bid/4401 • CWE-203: Observable Discrepancy •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in OpenBSD 3.0, when using YP with netgroups in the password database, causes (1) rexec or (2) rsh to run another user's shell, or (3) atrun to change to a different user's directory, possibly due to memory allocation failures or an incorrect call to auth_approval(). • http://www.iss.net/security_center/static/8625.php http://www.openbsd.org/errata30.html#approval http://www.securityfocus.com/bid/4338 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 3

The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference. • https://www.exploit-db.com/exploits/21167 http://archives.neohapsis.com/archives/bugtraq/2001-12/0014.html http://monkey.org/openbsd/archive/tech/0112/msg00015.html http://www.iss.net/security_center/static/7690.php • CWE-476: NULL Pointer Dereference •