CVE-2000-0440 – FreeBSD 3.4/4.0/5.0 / NetBSD 1.4 - Unaligned IP Option Denial of Service
https://notcve.org/view.php?id=CVE-2000-0440
NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option. • https://www.exploit-db.com/exploits/19896 ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-002.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html http://www.securityfocus.com/bid/1173 •
CVE-2000-0094 – FreeBSD 3.4 / NetBSD 1.4.1 / OpenBSD 2.6 - '/proc' FileSystem
https://notcve.org/view.php?id=CVE-2000-0094
procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr. • https://www.exploit-db.com/exploits/19726 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-001.txt.asc http://www.osvdb.org/20760 http://www.securityfocus.com/bid/940 https://exchange.xforce.ibmcloud.com/vulnerabilities/3995 •
CVE-2000-0157
https://notcve.org/view.php?id=CVE-2000-0157
NetBSD ptrace call on VAX allows local users to gain privileges by modifying the PSL contents in the debugging process. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-012.txt.asc http://www.securityfocus.com/bid/992 •
CVE-2000-0092
https://notcve.org/view.php?id=CVE-2000-0092
The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc http://www.securityfocus.com/bid/939 •
CVE-2000-0489 – FreeBSD 5.0 / NetBSD 1.4.2 / OpenBSD 2.7 - 'setsockopt()' Denial of Service
https://notcve.org/view.php?id=CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers. • https://www.exploit-db.com/exploits/19488 http://www.securityfocus.com/bid/622 http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs%40ussrback.com http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9908270039010.16315-100000%40thetis.deor.org https://exchange.xforce.ibmcloud.com/vulnerabilities/3298 •