Page 20 of 402 results (0.016 seconds)

CVSS: 10.0EPSS: 3%CPEs: 16EXPL: 0

Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message. Desbordamiento de buffer basado en pila en rtsold en FreeBSD 9.1 hasta 10.1-RC2 permite a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de parámetros DNS manipulados en un mensaje de anuncio de router. • http://www.securitytracker.com/id/1031098 https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A20.rtsold.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 16EXPL: 0

namei in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (memory exhaustion) via vectors that trigger a sandboxed process to look up a large number of nonexistent path names. namei en FreeBSD 9.1 hasta 10.1-RC2 permite a atacantes remotos causar una denegación de servicio (agotamiento de memoria) a través de vectores que provocan que un proceso de sandbox busque un número grande de nombres de rutas no existentes. • http://secunia.com/advisories/62218 http://www.debian.org/security/2014/dsa-3070 http://www.securitytracker.com/id/1031100 https://www.freebsd.org/security/advisories/FreeBSD-SA-14:22.namei.asc • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The VIQR module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (out-of-bounds array access) via a crafted argument to the iconv_open function. NOTE: this issue was SPLIT from CVE-2014-3951 per ADT2 due to different vulnerability types. El módulo VIQR en la implementación iconv en FreeBSD 10.0 anterior a p6 y NetBSD permite a atacantes dependientes de contexto causar una denegación de servicio (acceso a array fuera de rango) a través de un argumento manipulado en la función iconv_open. NOTA: este problema ha sido dividido (SPLIT) del CVE-2014-3951 por ADT2 debido a diferentes tipos de vulnerabilidad. • http://mail-index.netbsd.org/source-changes/2014/06/24/msg055822.html http://www.freebsd.org/security/advisories/FreeBSD-SA-14:15.iconv.asc http://www.securitytracker.com/id/1030458 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 0

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize the buffer between the header and data of a control message, which allows local users to obtain sensitive information from kernel memory via unspecified vectors. FreeBSD 8.4 anterior a p14, 9.1 anterior a p17, 9.2 anterior a p10 y 10.0 anterior a p7 no inicializa debidamente el buffer entre la cabecera y los datos de un mensaje de control, lo que permite a usuarios locales obtener información sensible de la memoria del kernel a través de vectores no especificados. • http://secunia.com/advisories/62218 http://www.debian.org/security/2014/dsa-3070 http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc http://www.securityfocus.com/bid/68466 http://www.securitytracker.com/id/1030539 https://exchange.xforce.ibmcloud.com/vulnerabilities/94448 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 0

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification. FreeBSD 8.4 anterior a p14, 9.1 anterior a p17, 9.2 anterior a p10 y 10.0 anterior a p7 no inicializa debidamente ciertas estructuras de datos, lo que permite a usuarios locales obtener información sensible de la memoria del kernel a través de un cmsg (1) SCTP_SNDRCV, (2) SCTP_EXTRCV o (3) SCTP_RCVINFO SCTP o una notificación (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR o (6) SCTP_AUTHENTICATION_EVENT. • http://secunia.com/advisories/62218 http://www.debian.org/security/2014/dsa-3070 http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc http://www.securitytracker.com/id/1030539 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •