Page 22 of 321 results (0.006 seconds)

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 3

The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto. El núcleo en FreeBSD 6.1 y OpenBSD 4.0 permite a usuarios locales provocar una denegación de servicio mediante vectores sin especificar relativas a peticiones concretas ioctl al /dev/crypto. • https://www.exploit-db.com/exploits/2639 http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html http://secunia.com/advisories/22543 http://www.securityfocus.com/bid/20713 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

ufs_vnops.c in FreeBSD 6.1 allows local users to cause an unspecified denial of service by calling the ftruncate function on a file type that is not VREG, VLNK or VDIR, which is not defined in POSIX. ufs_vnops.c en FreeBSD 6.1 permite a usuarios locales provocar una denegación de servicio llamando a la función ftruncate en un archivo que no es del tipo VREG, VLNK ni VDIR, el cual no está definido en POSIX. Month of Apple Bugs - This is a specially crafted HFS+ filesystem in a DMG image that can cause the do_hfs_truncate() function to panic the kernel (denial of service), when attempting to remove a file from the mounted filesystem. This issue can't lead to arbitrary code execution, although there's a significant risk of local HFS+ filesystems corruption. • https://www.exploit-db.com/exploits/2541 http://lists.freebsd.org/pipermail/cvs-src/2006-May/064488.html http://secunia.com/advisories/22413 http://www.securityfocus.com/bid/20522 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

p1003_1b.c in FreeBSD 6.1 allows local users to cause an unspecified denial of service by setting a scheduler policy, which should only be settable by root. p1003_1b.c en FreeBSD 6.1 permite a usuarios locales provocar una denegación de servicio no especificada estableciendo una política de tareas, lo cual sólo debe ser configurable por el usuario root. • https://www.exploit-db.com/exploits/2542 http://lists.freebsd.org/pipermail/cvs-src/2006-May/063969.html http://secunia.com/advisories/22413 http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/posix4/p1003_1b.c.diff?r1=1.24&r2=1.24.2.1 http://www.securityfocus.com/bid/20517 •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 1

Integer signedness error in FreeBSD 6.0-RELEASE allows local users to cause a denial of service (memory corruption and kernel panic) via a PT_LWPINFO ptrace command with a large negative data value that satisfies a signed maximum value check but is used in an unsigned copyout function call. Error de signo de entero en FreeBSD 6.0-RELEASE permite a usuarios locales propiciar una denegación de servicio (corrupción de memoria y pánico kernel) mediante una órden PT_LWPINFO ptrace con un valor de dato grande y negativo que concuerda con una validación de máximo valor con signo, pero que es usado en la devolución sin signo de una función. • https://www.exploit-db.com/exploits/2524 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=419 http://secunia.com/advisories/22367 http://www.securityfocus.com/bid/20440 https://exchange.xforce.ibmcloud.com/vulnerabilities/29476 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Integer overflow vulnerability in the i386_set_ldt call in FreeBSD 5.5, and possibly earlier versions down to 5.2, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2006-4178. Vulnerabilidad por desbordamiento de entero en la llamada i386_set_ldt en FreeBSD 5.5, y posiblemente versiones anteriores desde la 5.2, permite a usuarios locales provocar denegación de servicio (caída) y posiblemente ejecutar código mediante vectores no especificados, una vulnerabilidad diferente a CVE-2006-4178. • http://archives.neohapsis.com/archives/bugtraq/2006-09/0376.html http://secunia.com/advisories/22064 http://securitytracker.com/id?1016926 http://securitytracker.com/id?1016928 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=414 http://www.securityfocus.com/archive/1/446945/100/0/threaded http://www.securityfocus.com/bid/20158 https://exchange.xforce.ibmcloud.com/vulnerabilities/29132 •