Show filters
33 Total Results
Displaying 1-10 of 33
Sort by:
Attacker Value
Unknown
The BSD libc library's link_ntoa() function may be vulnerable to a classic buff…
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an attacker to read or write from memory. The full impact and severity depends on the method of exploit and how the library is used by applications. According to analysis by FreeBSD developers, it is very unlikely that applications exist that utilize link_ntoa() in an exploitable manner, and the CERT/CC is not aware of any proof of concept. A blog post describes the functionality of link_ntoa() and points out that none of the base utilities use this function in an exploitable manner. For more information, please see FreeBSD Security Advisory SA-16:37.
0
Attacker Value
Unknown
CVE-2015-5674
Disclosure Date: February 05, 2018 (last updated November 26, 2024)
The routed daemon in FreeBSD 9.3 before 9.3-RELEASE-p22, 10.2-RC2 before 10.2-RC2-p1, 10.2-RC1 before 10.2-RC1-p2, 10.2 before 10.2-BETA2-p3, and 10.1 before 10.1-RELEASE-p17 allows remote authenticated users to cause a denial of service (assertion failure and daemon exit) via a query from a network that is not directly connected.
0
Attacker Value
Unknown
CVE-2015-1416
Disclosure Date: February 05, 2018 (last updated November 26, 2024)
Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file.
0
Attacker Value
Unknown
CVE-2015-1418
Disclosure Date: February 05, 2018 (last updated November 26, 2024)
The do_ed_script function in pch.c in GNU patch through 2.7.6, and patch in FreeBSD 10.1 before 10.1-RELEASE-p17, 10.2 before 10.2-BETA2-p3, 10.2-RC1 before 10.2-RC1-p2, and 0.2-RC2 before 10.2-RC2-p1, allows remote attackers to execute arbitrary commands via a crafted patch file, because a '!' character can be passed to the ed program.
0
Attacker Value
Unknown
CVE-2015-1417
Disclosure Date: July 25, 2017 (last updated November 26, 2024)
The inet module in FreeBSD 10.2x before 10.2-PRERELEASE, 10.2-BETA2-p2, 10.2-RC1-p1, 10.1x before 10.1-RELEASE-p16, 9.x before 9.3-STABLE, 9.3-RELEASE-p21, and 8.x before 8.4-STABLE, 8.4-RELEASE-p35 on systems with VNET enabled and at least 16 VNET instances allows remote attackers to cause a denial of service (mbuf consumption) via multiple concurrent TCP connections.
0
Attacker Value
Unknown
CVE-2016-1880
Disclosure Date: February 15, 2017 (last updated November 26, 2024)
The Linux compatibility layer in the kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to read portions of kernel memory and potentially gain privilege via unspecified vectors, related to "handling of Linux futex robust lists."
0
Attacker Value
Unknown
CVE-2016-1888
Disclosure Date: February 15, 2017 (last updated November 26, 2024)
The telnetd service in FreeBSD 9.3, 10.1, 10.2, 10.3, and 11.0 allows remote attackers to inject arguments to login and bypass authentication via vectors involving a "sequence of memory allocation failures."
0
Attacker Value
Unknown
CVE-2016-1883
Disclosure Date: February 15, 2017 (last updated November 26, 2024)
The issetugid system call in the Linux compatibility layer in FreeBSD 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.
0
Attacker Value
Unknown
CVE-2016-1881
Disclosure Date: February 15, 2017 (last updated November 26, 2024)
The kernel in FreeBSD 9.3, 10.1, and 10.2 allows local users to cause a denial of service (crash) or potentially gain privilege via a crafted Linux compatibility layer setgroups system call.
0
Attacker Value
Unknown
CVE-2016-1889
Disclosure Date: February 15, 2017 (last updated November 26, 2024)
Integer overflow in the bhyve hypervisor in FreeBSD 10.1, 10.2, 10.3, and 11.0 when configured with a large amount of guest memory, allows local users to gain privilege via a crafted device descriptor.
0