Page 4 of 82 results (0.010 seconds)

CVSS: 5.5EPSS: 0%CPEs: 38EXPL: 0

31 Dec 2002 — tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file. • http://online.securityfocus.com/archive/1/283033 • CWE-667: Improper Locking •

CVSS: 7.0EPSS: 0%CPEs: 52EXPL: 0

31 Dec 2002 — Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:08.exec.asc •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

31 Dec 2002 — syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0272.html • CWE-16: Configuration •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

12 Aug 2002 — KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 packets. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0057.html •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

12 Aug 2002 — OpenBSD 2.9 through 3.1 allows local users to cause a denial of service (resource exhaustion) and gain root privileges by filling the kernel's file descriptor table and closing file descriptors 0, 1, or 2 before executing a privileged process, which is not properly handled when OpenBSD fails to open an alternate descriptor. • http://online.securityfocus.com/archive/1/271702 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

01 Aug 2002 — Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call. Vulnerabilidad de cadena de formato en la función startprinting() de printjob.c en el paquete lpr lpd basado en BSD puede permitir a usuarios locales ganar privilegios mediante una llamada impropia a syslog que usa cadenas de formato de la llamada checkremote(). • http://marc.info/?l=bugtraq&m=96994604300675&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

03 Jul 2002 — mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron. • https://www.exploit-db.com/exploits/21373 •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 3

11 Jun 2002 — FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. • https://www.exploit-db.com/exploits/21407 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 3

31 Dec 2001 — The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference. • https://www.exploit-db.com/exploits/21167 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

13 Nov 2001 — vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.9/common/016_recover.patch •