Page 31 of 762 results (0.002 seconds)

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

19 Mar 2020 — In FreeBSD 12.1-STABLE before r356089, 12.1-RELEASE before 12.1-RELEASE-p3, 11.3-STABLE before r356090, and 11.3-RELEASE before 11.3-RELEASE-p7, driver specific ioctl command handlers in the oce network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to send passthrough commands to the device firmware. En FreeBSD versiones 12.1-STABLE anteriores a r356089, versiones 12.1-RELEASE anteriores a 12.1-RELEASE-p3, versiones 11.3-STABLE anteriores a r356090 y version... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:05.if_oce_ioctl.asc • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2020 — grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS. grub2-bhyve, como es usado en FreeBSD bhyve anterior a revisión 525916 12-02-2020, no comprueba la dirección proporcionada como parte de un coman... • https://svnweb.freebsd.org/ports?view=revision&revision=525916 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Mar 2020 — grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, mishandles font loading by a guest through a grub2.cfg file, leading to a buffer overflow. grub2-bhyve, como es usado en FreeBSD bhyve anterior a revisión 525916 12-02-2020, maneja inapropiadamente una carga de fuentes por parte de un invitado mediante un archivo grub2.cfg, conllevando a un desbordamiento de búfer. • https://svnweb.freebsd.org/ports?view=revision&revision=525916 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

20 Feb 2020 — The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Neighbor Solicitation messages, a different vulnerability than CVE-2011-2393. La implementación de IPv6 en FreeBSD y NetBSD (versiones desconocidas, año 2012 y anteriores), permite a atacantes remotos causar una denegación de servicio por medio de una avalancha de mensajes ICMPv6 Neighbor Solicitation, una vulnerabilidad diferente de CVE-2011-2393... • http://www.openwall.com/lists/oss-security/2012/10/10/12 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

20 Feb 2020 — The IPv6 implementation in FreeBSD and NetBSD (unknown versions, year 2012 and earlier) allows remote attackers to cause a denial of service via a flood of ICMPv6 Router Advertisement packets containing multiple Routing entries. La implementación de IPv6 en FreeBSD y NetBSD (versiones desconocidas, año 2012 y anteriores) permite a atacantes remotos causar una denegación de servicio por medio de una avalancha de paquetes ICMPv6 Router Advertisement, que contienen múltiples entradas de Enrutamiento. • http://www.openwall.com/lists/oss-security/2012/10/10/12 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 3.3EPSS: 0%CPEs: 20EXPL: 0

28 Jan 2020 — In FreeBSD 12.1-STABLE before r354734, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r354735, and 11.3-RELEASE before 11.3-RELEASE-p6, due to incorrect initialization of a stack data structure, core dump files may contain up to 20 bytes of kernel data previously stored on the stack. En FreeBSD versiones 12.1-STABLE anteriores a r354734, versiones 12.1-RELEASE anteriores a 12.1-RELEASE-p2, versiones 12.0-RELEASE anteriores a 12.0-RELEASE-p13, versiones 11.3-STA... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:03.thrmisc.asc • CWE-665: Improper Initialization •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 0

28 Jan 2020 — In FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated. En FreeBSD versiones 12.0-RELEASE anteriores a 12.0-RELEASE-p13, una falta de comprobación en el procesador de paquetes ipsec, permite que una reinyección de un paquete antiguo sea aceptada por parte del endpoint de ipsec. Dependiendo del pro... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:02.ipsec.asc • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 9.8EPSS: 1%CPEs: 20EXPL: 0

28 Jan 2020 — In FreeBSD 12.1-STABLE before r357213, 12.1-RELEASE before 12.1-RELEASE-p2, 12.0-RELEASE before 12.0-RELEASE-p13, 11.3-STABLE before r357214, and 11.3-RELEASE before 11.3-RELEASE-p6, URL handling in libfetch with URLs containing username and/or password components is vulnerable to a heap buffer overflow allowing program misbehavior or malicious code execution. En FreeBSD versiones 12.1-STABLE anteriores a r357213, versiones 12.1-RELEASE versiones anteriores a 12.1-RELEASE-p2, versiones 12.0-RELEASE anterior... • https://security.FreeBSD.org/advisories/FreeBSD-SA-20:01.libfetch.asc • CWE-787: Out-of-bounds Write •

CVSS: 7.4EPSS: 0%CPEs: 8EXPL: 0

11 Dec 2019 — A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel. Se detectó una vulne... • http://seclists.org/fulldisclosure/2020/Dec/32 • CWE-300: Channel Accessible by Non-Endpoint •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

05 Dec 2019 — Weak file permissions applied to the Aviatrix VPN Client through 2.2.10 installation directory on Windows and Linux allow a local attacker to execute arbitrary code by gaining elevated privileges through file modifications. Unos permisos de archivos débiles aplicados al directorio de instalación de Aviatrix VPN Client versiones hasta 2.2.10 sobre Windows y Linux, permiten a un atacante local ejecutar código arbitrario al conseguir privilegios elevados por medio de modificaciones de archivos. • https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html • CWE-732: Incorrect Permission Assignment for Critical Resource •