Page 25 of 710 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

03 Sep 2020 — In MidnightBSD before 1.2.6 and 1.3 before August 2020, and FreeBSD before 7, a NULL pointer dereference was found in the Linux emulation layer that allows attackers to crash the running kernel. During binary interaction, td->td_emuldata in sys/compat/linux/linux_emul.h is not getting initialized and returns NULL from em_find(). En MidnightBSD versiones anteriores a 1.2.6 y versiones 1.3 anteriores a Agosto de 2020, y FreeBSD versiones anteriores a 7, se encontró una desreferencia del puntero NULL en la cap... • http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:02.txt • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 2

03 Sep 2020 — A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode. Se encontró una vulnerabilidad de corrupción de memoria en la función del kernel kern_getfsstat en MidnightBSD versiones anteriores a 1.2.7 y versiones 1.3 hasta el19-08-2020, y FreeBSD versiones hasta 11.4, que pe... • http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:01.txt • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

27 Aug 2020 — OpenZFS before 2.0.0-rc1, when used on FreeBSD, allows execute permissions for all directories. OpenZFS versiones anteriores a 2.0.0-rc1, cuando es usado en FreeBSD, permite ejecutar permisos para todos los directorios • https://github.com/openzfs/zfs/commit/716b53d0a14c72bda16c0872565dd1909757e73f • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

27 Aug 2020 — OpenZFS before 2.0.0-rc1, when used on FreeBSD, misinterprets group permissions as user permissions, as demonstrated by mode 0770 being equivalent to mode 0777. OpenZFS versiones anteriores a 2.0.0-rc1, cuando es usado en FreeBSD, malinterpreta los permisos de grupo como permisos de usuario, como es demostrado por el modo 0770 que es equivalente al modo 0777 • https://github.com/openzfs/zfs/commit/716b53d0a14c72bda16c0872565dd1909757e73f • CWE-276: Incorrect Default Permissions •

CVSS: 6.8EPSS: 0%CPEs: 21EXPL: 0

06 Aug 2020 — In FreeBSD 12.1-STABLE before r362166, 12.1-RELEASE before p8, 11.4-STABLE before r362167, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, missing length validation code common to mulitple USB network drivers allows a malicious USB device to write beyond the end of an allocated network packet buffer. En FreeBSD versiones 12.1-ESTABLE anteriores a r362166, versiones 12.1-RELEASE anteriores a p8, versiones 11.4-ESTABLE anteriores a r362167, versiones 11.4-RELEASE anteriores a de p2 y versiones 11.3-RELEA... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:21.usb_net.asc • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 1%CPEs: 21EXPL: 0

06 Aug 2020 — In FreeBSD 12.1-STABLE before r363918, 12.1-RELEASE before p8, 11.4-STABLE before r363919, 11.4-RELEASE before p2, and 11.3-RELEASE before p12, the sendmsg system call in the compat32 subsystem on 64-bit platforms has a time-of-check to time-of-use vulnerability allowing a mailcious userspace program to modify control message headers after they were validation. En FreeBSD versiones 12.1-ESTABLE anteriores a r363918, versiones 12.1-RELEASE anteriores a p8, versiones 11.4-ESTABLE anteriores a r363919, version... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:23.sendmsg.asc • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

09 Jul 2020 — In FreeBSD 12.1-STABLE before r362281, 11.4-STABLE before r362281, and 11.4-RELEASE before p1, long values in the user-controlled PATH environment variable cause posix_spawnp to write beyond the end of the heap allocated stack possibly leading to arbitrary code execution. En FreeBSD versiones 12.1-STABLE anteriores a r362281, versiones 11.4-STABLE anteriores a r362281 y versiones 11.4-RELEASE anteriores a p1, los valores largos en la variable de entorno PATH controlada por el usuario causan que la función p... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:18.posix_spawnp.asc • CWE-787: Out-of-bounds Write •

CVSS: 8.1EPSS: 64%CPEs: 21EXPL: 2

09 Jul 2020 — In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution. En FreeBSD versiones 12.1-ESTABLE anteriores a r359565, versiones 12.1-RELEASE anteriores a p7, versiones 11.4-ESTABLE anteriores a r362975, versiones 11.4-R... • https://packetstorm.news/files/id/158695 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free CWE-662: Improper Synchronization •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

09 Jun 2020 — In FreeBSD 12.1-STABLE before r361918, 12.1-RELEASE before p6, 11.4-STABLE before r361919, 11.3-RELEASE before p10, and 11.4-RC2 before p1, an invalid memory location may be used for HID items if the push/pop level is not restored within the processing of that HID item allowing an attacker with physical access to a USB port to be able to use a specially crafted USB device to gain kernel or user-space code execution. En FreeBSD versión 12.1-ESTABLE versiones anteriores a r361918, 12.1-RELEASE versiones anter... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:17.usb.asc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 88%CPEs: 3EXPL: 6

09 Jun 2020 — AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution. AnyDesk versiones anteriores a 5.5.3 en Linux y FreeBSD presenta una vulnerabilidad de cadena de formato que puede ser explotada para una ejecución de código remota AnyDesk version 5.5.2 suffers from a remote code execution vulnerability. • https://packetstorm.news/files/id/161628 • CWE-134: Use of Externally-Controlled Format String •