Page 25 of 245 results (0.006 seconds)

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 4

FreeBSD port programs that use libkvm for FreeBSD 4.6.2-RELEASE and earlier, including (1) asmon, (2) ascpu, (3) bubblemon, (4) wmmon, and (5) wmnet2, leave open file descriptors for /dev/mem and /dev/kmem, which allows local users to read kernel memory. Programas portados a FreeBSD que usan libkvm para FreeBSD 4.6.2-RELEASE y anteriores, incluyendo asmon, ascpu, bubblemon, wmmon, y wmnet2, dejan abiertos descriptores de ficheros para /dev/mem y /dev/kmem, lo que permite a usuarios locales leer la memoria del kernel. • https://www.exploit-db.com/exploits/21798 https://www.exploit-db.com/exploits/21799 https://www.exploit-db.com/exploits/21797 https://www.exploit-db.com/exploits/21796 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:39.libkvm.asc http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0115.html http://marc.info/?l=bugtraq&m=103228135413310&w=2 http://www.iss.net/security_center/static/10109.php http://www.securityfocus.com/bid/5714 http://www&# •

CVSS: 4.6EPSS: 0%CPEs: 18EXPL: 0

Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and earlier may allow attackers to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_GETPALETTE ioctl. • http://marc.info/?l=bugtraq&m=102976839728706&w=2 http://www.iss.net/security_center/static/9903.php http://www.securityfocus.com/bid/5493 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

The kqueue mechanism in FreeBSD 4.3 through 4.6 STABLE allows local users to cause a denial of service (kernel panic) via a pipe call in which one end is terminated and an EVFILT_WRITE filter is registered for the other end. • http://marc.info/?l=bugtraq&m=102865142610126&w=2 http://www.iss.net/security_center/static/9774.php http://www.osvdb.org/5069 http://www.securityfocus.com/bid/5405 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 packets. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0057.html http://orange.kame.net/dev/cvsweb.cgi/kame/CHANGELOG http://www.iss.net/security_center/static/8416.php http://www.osvdb.org/5304 http://www.securityfocus.com/archive/1/259598 http://www.securityfocus.com/bid/4224 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Kerberos 5 su (k5su) in FreeBSD 4.5 and earlier does not verify that a user is a member of the wheel group before granting superuser privileges, which could allow unauthorized users to execute commands as root. Kerberos 5 su (k5su) en FreeBSD 4.5 y anteriores no verifican que el usuario sea miembro del grupo antes de otorgarle privilegios de superusuario, de modo podría permitir a usuarios no autorizados la ejecución de comandos como root. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:24.k5su.asc http://www.iss.net/security_center/static/9125.php http://www.osvdb.org/4893 http://www.securityfocus.com/bid/4777 •