Page 21 of 515 results (0.008 seconds)

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 3

In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail. En FreeBSD 11.2-STABLE tras r338618 y antes de r343786, 12.0-STABLE antes de r343781 y 12.0-RELEASE antes de 12.0-RELEASE-p3, un error en la implementación del conteo de referencias para los sockets del dominio UNIX pueden provocar que se lance incorrectamente una estructura de datos. Esto podría permitir que un usuario local malicioso obtenga privilegios root o escape de una cárcel. • https://www.exploit-db.com/exploits/47081 https://www.exploit-db.com/exploits/47829 https://github.com/raymontag/CVE-2019-5596 http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html https://security.FreeBSD.org/advisories/FreeBSD-SA-19:02.fd.asc •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

In FreeBSD before 11.2-STABLE(r343782), 11.2-RELEASE-p9, 12.0-STABLE(r343781), and 12.0-RELEASE-p3, kernel callee-save registers are not properly sanitized before return from system calls, potentially allowing some kernel data used in the system call to be exposed. En FreeBSD, en versiones anteriores a la 11.2-STABLE(r343782), 11.2-RELEASE-p9, 12.0-STABLE(r343781) y 12.0-RELEASE-p3, los registros callee-save del kernel no se sanean correctamente antes de volver de las llamadas del sistema, lo que podría permitir que se expongan algunos datos del kernel empleados en la llamada del sistema. • https://exchange.xforce.ibmcloud.com/vulnerabilities/156624 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:01.syscall.asc • CWE-459: Incomplete Cleanup •

CVSS: 5.9EPSS: 0%CPEs: 55EXPL: 3

An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file). • https://www.exploit-db.com/exploits/46516 https://www.exploit-db.com/exploits/46193 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html http://www.openwall.com/lists/oss-security/2019/04/18/1 http://www.openwall.com/lists/oss-security/2022/08/02/1 http://www.securityfocus.com/bid/106741 https://access.redhat.com/errata/RHSA-2019:3702 https://bugzilla.redhat.com/show_bug.cgi?id=1677794 https://cert-portal.siemens.com/productcert/pdf/ssa-412672&# • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 2%CPEs: 7EXPL: 0

In FreeBSD before 11.2-STABLE(r348229), 11.2-RELEASE-p7, 12.0-STABLE(r342228), and 12.0-RELEASE-p1, insufficient validation of network-provided data in bootpd may make it possible for a malicious attacker to craft a bootp packet which could cause a stack buffer overflow. It is possible that the buffer overflow could lead to a Denial of Service or remote code execution. En FreeBSD en versiones anteriores a la 1.2-STABLE(r348229), 11.2-RELEASE-p7 y 12.0-STABLE(r342228) y en la 12.0-RELEASE-p1, una validación insuficiente de los datos proporcionados por la red en bootpd podría permitir que un atacante malicioso manipule un paquete bootp, lo que podría conducir a un desbordamiento de búfer basado en pila. Es posible que el desbordamiento de búfer provoque una denegación de servicio (DoS) o ejecución remota de código. • http://www.securityfocus.com/bid/106292 https://security.freebsd.org/advisories/FreeBSD-SA-18:15.bootpd.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

In FreeBSD before 11.2-STABLE(r341486) and 11.2-RELEASE-p6, insufficient bounds checking in one of the device models provided by bhyve can permit a guest operating system to overwrite memory in the bhyve host possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root. En FreeBSD, en versiones anteriores a la 11.2-STABLE(r340854) y la 11.2-RELEASE-p5, una comprobación de límites insuficiente en uno de los modelos del dispositivo proporcionado por bhyve puede permitir que un sistema operativo invitado sobrescriba la memoria en el host bhyve, lo que podría permitir la ejecución de código arbitrario. Un sistema operativo invitado que emplea una imagen de firmware puede provocar que el proceso bhyve se cierre inesperadamente, así como la posible ejecución de código arbitrario en el host como root. • http://www.securityfocus.com/bid/106210 https://security.freebsd.org/advisories/FreeBSD-SA-18:14.bhyve.asc • CWE-787: Out-of-bounds Write •