CVE-2004-1066
https://notcve.org/view.php?id=CVE-2004-1066
The cmdline pseudofiles in (1) procfs on FreeBSD 4.8 through 5.3, and (2) linprocfs on FreeBSD 5.x through 5.3, do not properly validate a process argument vector, which allows local users to cause a denial of service (panic) or read portions of kernel memory. NOTE: this candidate might be SPLIT into 2 separate items in the future. Los pseudoficheros cmdline en procfs en FreeBSD 4.8 a 5.3, y linprocfs en FreeBSD 5.x a 5.3 no validan adecuadamente un vector de argumento de proceso, lo que permite a usuarios locales causar una denegación de servicio (pánico) o leer porciones de memoria del kernle. NOTA: Esta candidata puede ser separada en dos vulnerabilidades en el futuro. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:17.procfs.asc https://exchange.xforce.ibmcloud.com/vulnerabilities/18321 •
CVE-2004-1053
https://notcve.org/view.php?id=CVE-2004-1053
Integer overflow in fetch on FreeBSD 4.1 through 5.3 allows remote malicious servers to execute arbitrary code via certain HTTP headers in an HTTP response, which lead to a buffer overflow. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:16.fetch.asc http://www.securityfocus.com/bid/11702 https://exchange.xforce.ibmcloud.com/vulnerabilities/18160 •
CVE-2004-0919
https://notcve.org/view.php?id=CVE-2004-0919
The syscons CONS_SCRSHOT ioctl in FreeBSD 5.x allows local users to read arbitrary kernel memory via (1) negative coordinates or (2) large coordinates. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:15.syscons.asc http://secunia.com/advisories/12722 http://www.kb.cert.org/vuls/id/969078 http://www.securityfocus.com/bid/11321 https://exchange.xforce.ibmcloud.com/vulnerabilities/17584 •
CVE-2004-0602
https://notcve.org/view.php?id=CVE-2004-0602
The binary compatibility mode for FreeBSD 4.x and 5.x does not properly handle certain Linux system calls, which could allow local users to access kernel memory to gain privileges or cause a system panic. El modo de compatibilidad binaria de FreeBSD 4.x y 5.x no maneja adecuadamente ciertas llamadas al sistema de Linux, lo que podría permitir a usuarios locales acceder a memoria del kernel para ganar privilegios o causar un pánico de sistema. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:13.linux.asc http://www.securityfocus.com/bid/10643 https://exchange.xforce.ibmcloud.com/vulnerabilities/16558 •
CVE-2004-0618 – FreeBSD 4.10/5.x - 'execve()' Unaligned Memory Access Denial of Service
https://notcve.org/view.php?id=CVE-2004-0618
FreeBSD 5.1 for the Alpha processor allows local users to cause a denial of service (crash) via an execve system call with an unaligned memory address as an argument. FreeBSD 5.1 para procesadores Alfa permite a usuarios locales causar una denegación de servicio (caída) mediante una llamada de sistema con una dirección de memoria no alineada como argumento. • https://www.exploit-db.com/exploits/24233 http://marc.info/?l=bugtraq&m=108816603102865&w=2 http://www.securityfocus.com/bid/10596 https://exchange.xforce.ibmcloud.com/vulnerabilities/16499 •