Page 7 of 43 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html http://www.kb.cert.org/vuls/id/358960 http://www.openbsd.org/errata.html#userldt http://www.osvdb.org/6141 http://www.securityfocus.com/bid/2739 https://exchange.xforce.ibmcloud.com/vulnerabilities/6222 •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 3

One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/234 https://www.exploit-db.com/exploits/20512 ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-018.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-12/0275.html http://www.openbsd.org/advisories/ftpd_replydirname.txt http://www.securityfocus.com/bid/2124 https://exchange.xforce.ibmcloud.com/vulnerabilities/5776 •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 2

Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd. • https://www.exploit-db.com/exploits/243 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:58.chpass.asc ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-015.txt.asc http://marc.info/?l=bugtraq&m=97068555106135&w=2 http://www.openbsd.org/errata27.html#pw_error http://www.securityfocus.com/bid/1744 https://exchange.xforce.ibmcloud.com/vulnerabilities/5339 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch http://www.securityfocus.com/bid/1752 https://exchange.xforce.ibmcloud.com/vulnerabilities/5337 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1558 •