Page 20 of 130 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html http://www.kb.cert.org/vuls/id/358960 http://www.openbsd.org/errata.html#userldt http://www.osvdb.org/6141 http://www.securityfocus.com/bid/2739 https://exchange.xforce.ibmcloud.com/vulnerabilities/6222 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in IPSEC authentication mechanism for OpenBSD 2.8 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a malformed Authentication header (AH) IPv4 option. • http://www.openbsd.org/errata.html#ipsec_ah http://www.osvdb.org/6026 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations. • http://www.openbsd.org/errata.html#ifmedia http://www.osvdb.org/7540 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. • http://www.openbsd.org/errata24.html#maxqueue http://www.osvdb.org/7539 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service. • http://www.openbsd.org/errata24.html#trctrap http://www.osvdb.org/6126 •