Page 16 of 162 results (0.012 seconds)

CVSS: 4.9EPSS: 0%CPEs: 5EXPL: 0

NetBSD 2.0 before 2.0.4, 2.1 before 2.1.1, and 3, when the kernel is compiled with "options DIAGNOSTIC," allows local users to cause a denial of service (kernel assertion panic) via a negative linger time in the SO_LINGER socket option. • http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/kern/uipc_socket.c.diff?r1=1.111&r2=1.112 http://mail-index.netbsd.org/netbsd-announce/2005/11/08/0010.html http://mail-index.netbsd.org/source-changes/2005/10/21/0038.html http://www.securityfocus.com/bid/15289 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The (1) clcs and (2) emuxki drivers in NetBSD 1.6 through 2.0.2 allow local users to cause a denial of service (kernel crash) by using the set-parameters ioctl on an audio device to change the block size and set the pause state to "unpaused" in the same ioctl, which causes a divide-by-zero error. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-002.txt.asc •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges. • https://www.exploit-db.com/exploits/24113 ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-007.txt.asc http://marc.info/?l=bugtraq&m=108432258920570&w=2 http://secunia.com/advisories/11585 http://www.securityfocus.com/bid/10320 https://exchange.xforce.ibmcloud.com/vulnerabilities/16110 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in NetBSD kernel may allow local users to execute arbitrary code and gain privileges. • http://gleg.net/advisory_netbsd2.shtml •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

Multiple syscalls in the compat subsystem for NetBSD before 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-010.txt.asc http://gleg.net/advisory_netbsd2.shtml http://secunia.com/advisories/13501 https://exchange.xforce.ibmcloud.com/vulnerabilities/18564 •