Page 8 of 46 results (0.013 seconds)

CVSS: 7.5EPSS: 1%CPEs: 38EXPL: 0

A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:11.ipsec.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-011.txt.asc http://secunia.com/advisories/19366 http://securitytracker.com/id?1015809 http://www.osvdb.org/24068 http://www.securityfocus.com/bid/17191 https://exchange.xforce.ibmcloud.com/vulnerabilities/25398 •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

The kernfs_xread function in kernfs in NetBSD 1.6 through 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges via the lseek system call. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-001.txt.asc http://secunia.com/advisories/18388 http://secunia.com/advisories/18712 http://securityreason.com/securityalert/405 http://www.osvdb.org/22293 http://www.securityfocus.com/archive/1/423827/100/0/threaded http://www.securityfocus.com/bid/16173 http://www.securitylab.net/research/2006/02/advisory_netbsd_openbsd_kernfs.html https://exchange.xforce.ibmcloud.com/vulnerabilities/24035 •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

imake in NetBSD before 2.0.3, NetBSD-current before 12 September 2005, certain versions of X.Org, and certain versions of XFree86 allows local users to overwrite arbitrary files via a symlink attack on the temporary file for the file.0 target, which is used for a pre-formatted manual page. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-009.txt.asc http://mail-index.netbsd.org/netbsd-announce/2005/10/31/0000.html http://mail-index.netbsd.org/source-changes/2005/09/12/0043.html http://securitytracker.com/id?1015132 http://www.osvdb.org/20731 http://www.securityfocus.com/bid/15263 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 0

Integer overflow in the FreeBSD compatibility code (freebsd_misc.c) in NetBSD-current, NetBSD-3, NetBSD-2.0, and NetBSD-2 before 20050913; and NetBSD-1.6 before 20050914; allows local users to cause a denial of service (heap corruption or system crash) and possibly gain root privileges. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2005-008.txt.asc http://mail-index.netbsd.org/source-changes/2005/09/13/0024.html http://www.osvdb.org/20757 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

kernfs_xread in kernfs_vnops.c in NetBSD before 20050831 does not check for a negative offset when reading the message buffer, which allows local users to read arbitrary kernel memory. • http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/miscfs/kernfs/kernfs_vnops.c.diff?r1=1.110&r2=1.111&f=h http://mail-index.netbsd.org/netbsd-announce/2005/10/31/0000.html http://releng.netbsd.org/cgi-bin/req-3.cgi?show=727 http://securitytracker.com/id?1015132 http://www.osvdb.org/20729 http://www.packetstormsecurity.org/0601-advisories/NetBSD-SA2006-001.txt •