
CVE-2008-1215 – BSD PPP 'pppx.conf' - Local Denial of Service
https://notcve.org/view.php?id=CVE-2008-1215
09 Mar 2008 — Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters. Desbordamiento de búfer basado en pila en la función command_Expand_Interpret de command.c en ppp (aka user-ppp), como se distribuyó en FreeBSD 6.3 y 7.0, OpenBSD 4.1 y 4.2, y el paquete net/userppp para NetBSD, permite a us... • https://www.exploit-db.com/exploits/31333 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2008-1146
https://notcve.org/view.php?id=CVE-2008-1146
04 Mar 2008 — A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning against OpenBSD's modification of BIND. Cierto algoritmo generador de números pseudo-aleatorios(PRNG) que usa XOR y alterna en saltos de 3-bit (también ... • http://secunia.com/advisories/28819 •

CVE-2008-1147
https://notcve.org/view.php?id=CVE-2008-1147
04 Mar 2008 — A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 2-bit random hops (aka "Algorithm X2"), as used in OpenBSD 2.6 through 3.4, Mac OS X 10 through 10.5.1, FreeBSD 4.4 through 7.0, and DragonFlyBSD 1.0 through 1.10.1, allows remote attackers to guess sensitive values such as IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as injection into TCP packets and OS fingerprinting. Cierto algoritmo generador de n... • http://seclists.org/bugtraq/2008/Feb/0052.html •

CVE-2008-1148
https://notcve.org/view.php?id=CVE-2008-1148
04 Mar 2008 — A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. NOTE: this issue can be leveraged for attacks such as DNS cache poisoning, injection into TCP packets, and OS fingerprinting. Cierto algoritmo generador de números pseu... • http://secunia.com/advisories/28819 •

CVE-2008-1057
https://notcve.org/view.php?id=CVE-2008-1057
28 Feb 2008 — The ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a denial of service (panic) via malformed IPv6 routing headers. La función ip6_check_rh0hdr de netinet6/ip6_input.c en OpenBSD 4.2, permite a atacantes provocar una denegación de servicio (error irrecuperable del sistema) a través de cabeceras de enrutamiento IPv6 mal formadas. • http://secunia.com/advisories/29078 •

CVE-2008-1058
https://notcve.org/view.php?id=CVE-2008-1058
28 Feb 2008 — The tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a denial of service (panic) via crafted TCP packets. NOTE: some of these details are obtained from third party information. Vulnerabilidad de Denegación de servicio en netinet/tcp_subr.c en OpenBSD 4.1 y 4.2, que permite a atacantes remotos causar una denegación de servicio (kernel panic) a través de paquetes TCP manipulados. NOTA: algunos d estos detalles han sido obtenidos de información de terceros. • http://secunia.com/advisories/29078 •

CVE-2007-6700 – OpenBSD 4.1 - bgplg 'cmd' Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2007-6700
05 Feb 2008 — Cross-site scripting (XSS) vulnerability in cgi-bin/bgplg in the web interface for the BGPD daemon in OpenBSD 4.1 allows remote attackers to inject arbitrary web script or HTML via the cmd parameter. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en cgi-bin/bgplg en la interfaz web para el demonio BGPD de OpernBSD 4.1 permite a atacantes remotos inyectar web script o HTML de su elección a través del parámetro cmd. • https://www.exploit-db.com/exploits/31081 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2008-0384 – OpenBSD 4.2 - 'rtlabel_id2name()' Local Null Pointer Dereference Denial of Service
https://notcve.org/view.php?id=CVE-2008-0384
22 Jan 2008 — OpenBSD 4.2 allows local users to cause a denial of service (kernel panic) by calling the SIOCGIFRTLABEL IOCTL on an interface that does not have a route label, which triggers a NULL pointer dereference when the return value from the rtlabel_id2name function is not checked. OpenBSD 4.2 permtie a usuarios locales provocar denegación de servicio (kernel panic) a través de una llamada SIOCGIFRTLABEL IOCTL sobre una interfaz que no tiene una etiqueta route, el cual dispara un puntero de referencia NULL cuando d... • https://www.exploit-db.com/exploits/4935 •

CVE-2007-5365 – Ubuntu 6.06 - DHCPd Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-5365
11 Oct 2007 — Stack-based buffer overflow in the cons_options function in options.c in dhcpd in OpenBSD 4.0 through 4.2, and some other dhcpd implementations based on ISC dhcp-2, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a DHCP request specifying a maximum message size smaller than the minimum IP MTU. Un desbordamiento de búfer en la región stack de la memoria en la función cons_options en el archivo options.c en dhcpd en OpenBSD versiones 4.0 hasta 4.2, y algunas o... • https://www.exploit-db.com/exploits/4601 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-4305 – Systrace - Multiple System Call Wrappers Concurrency Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-4305
13 Aug 2007 — Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing. Múltiples condiciones de carrera en (1) el modo monitor de Sudo Y (2) políticas Sysjail en Systrace de NetBSD y OpenBSD permiten a usuarios locales vencer la interposición en llamadas al sistema, y por tanto evitar la política de control de acceso y monitorización. • https://www.exploit-db.com/exploits/30484 •