Page 14 of 68 results (0.009 seconds)

CVSS: 6.9EPSS: 0%CPEs: 7EXPL: 0

The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script. La secuencia de comandos en FreeBSD 5.0 hasta 7.0-PRERELEASE llama a openpty, el cual crea un pseudo-terminal con permisos: lectura-todos y escritura-todos cuando no está funcionando como root, lo cual permite a usuarios locales leer datos desde el terminal del usuario ejecutando la secuencia de comandos. • http://secunia.com/advisories/28498 http://security.FreeBSD.org/advisories/FreeBSD-SA-08:01.pty.asc http://www.securityfocus.com/bid/27284 http://www.securitytracker.com/id?1019191 https://exchange.xforce.ibmcloud.com/vulnerabilities/39665 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 through 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms that rely on secrecy of those values. El código de "seguimiento del estado interno" para los dispositivos random y urandom de FreeBSD 5.5, 6.1 hasta 6.3, y 7.0 beta 4 permite a usuarios locales obtener parte de valores aleatorios que han sido accedidos previamente, lo cual podría aprovechado para evitar los mecanismos de protección basados en mantener estos valores en secreto. • http://osvdb.org/39600 http://secunia.com/advisories/27879 http://security.FreeBSD.org/advisories/FreeBSD-SA-07:09.random.asc http://www.securityfocus.com/bid/26642 http://www.securitytracker.com/id?1019022 http://www.vupen.com/english/advisories/2007/4053 https://exchange.xforce.ibmcloud.com/vulnerabilities/38764 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 2

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041177.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt http://www.redteam-pentesting.de/advisories/rt-sa-2005-15.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/24037 •