CVE-2001-0402 – IPFilter 3.x - Fragment Rule Bypass
https://notcve.org/view.php?id=CVE-2001-0402
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html http://marc.info/?l=bugtraq&m=98679734015538&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 •
CVE-2001-0230
https://notcve.org/view.php?id=CVE-2001-0230
Buffer overflow in dc20ctrl before 0.4_1 in FreeBSD, and possibly other operating systems, allows local users to gain privileges. • http://archives.neohapsis.com/archives/freebsd/2001-02/0083.html http://www.osvdb.org/6081 https://exchange.xforce.ibmcloud.com/vulnerabilities/6077 •
CVE-2001-0094
https://notcve.org/view.php?id=CVE-2001-0094
Buffer overflow in kdc_reply_cipher of libkrb (Kerberos 4 authentication library) in NetBSD 1.5 and FreeBSD 4.2 and earlier, as used in Kerberised applications such as telnetd and login, allows local users to gain root privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:25.kerberosIV.asc ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-017.txt.asc https://exchange.xforce.ibmcloud.com/vulnerabilities/5734 •
CVE-2001-0093 – BSD - 'TelnetD' Remote Command Execution
https://notcve.org/view.php?id=CVE-2001-0093
Vulnerability in telnetd in FreeBSD 1.5 allows local users to gain root privileges by modifying critical environmental variables that affect the behavior of telnetd. • https://www.exploit-db.com/exploits/409 ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-017.txt.asc •
CVE-2000-0916 – Linux Kernel 2.2 - Predictable TCP Initial Sequence Number
https://notcve.org/view.php?id=CVE-2000-0916
FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections. • https://www.exploit-db.com/exploits/19522 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:52.tcp-iss.asc http://www.securityfocus.com/bid/1766 •