CVE-2001-0183 – FreeBSD 3.x/4.x - 'ipfw' Filtering Evasion
https://notcve.org/view.php?id=CVE-2001-0183
ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc http://www.ciac.org/ciac/bulletins/l-029.shtml http://www.osvdb.org/1743 http://www.security-express.com/archives/bugtraq/2001-01/0424.html http://www.securityfocus.com/bid/2293 https://exchange.xforce.ibmcloud.com/vulnerabilities/5998 •
CVE-2001-0128
https://notcve.org/view.php?id=CVE-2001-0128
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365 http://www.debian.org/security/2000/20001219 http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3 http://www.osvdb.org/6284 http://www.redhat.com/support/errata/RHSA-2000-127.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5777 •
CVE-2000-0375
https://notcve.org/view.php?id=CVE-2000-0375
The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files. • http://www.osvdb.org/6084 •
CVE-2000-0890
https://notcve.org/view.php?id=CVE-2000-0890
periodic in FreeBSD 4.1.1 and earlier, and possibly other operating systems, allows local users to overwrite arbitrary files via a symlink attack. • http://www.kb.cert.org/vuls/id/626919 http://www.osvdb.org/1754 http://www.securityfocus.com/bid/2325 https://exchange.xforce.ibmcloud.com/vulnerabilities/6047 •
CVE-2001-0063
https://notcve.org/view.php?id=CVE-2001-0063
procfs in FreeBSD and possibly other operating systems allows local users to bypass access control restrictions for a jail environment and gain additional privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc http://www.osvdb.org/1691 http://www.securityfocus.com/bid/2132 https://exchange.xforce.ibmcloud.com/vulnerabilities/6108 •