Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown

CVE-2006-4304

Disclosure Date: August 24, 2006 (last updated October 04, 2023)
Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the overflow in (1) pppoe and (2) ippp. NOTE: this issue was originally incorrectly reported for the ppp driver.
0
Attacker Value
Unknown

CVE-2006-2655

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.
0
Attacker Value
Unknown

CVE-2006-2654

Disclosure Date: June 02, 2006 (last updated October 04, 2023)
Directory traversal vulnerability in smbfs smbfs on FreeBSD 4.10 up to 6.1 allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences. NOTE: this is similar to CVE-2006-1864, but this is a different implementation of smbfs, so it has a different CVE identifier.
0
Attacker Value
Unknown

CVE-2006-1283

Disclosure Date: March 23, 2006 (last updated October 04, 2023)
opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 through 6.1-STABLE before 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and possibly gain root privileges if a root shell is permitted by the configuration of the wheel group or sshd.
0
Attacker Value
Unknown

CVE-2006-0905

Disclosure Date: March 23, 2006 (last updated October 04, 2023)
A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks.
0
Attacker Value
Unknown

CVE-2006-0883

Disclosure Date: March 07, 2006 (last updated October 04, 2023)
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
0
Attacker Value
Unknown

CVE-2006-0433

Disclosure Date: February 02, 2006 (last updated October 04, 2023)
Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote attackers to cause a denial of service (infinite loop).
0
Attacker Value
Unknown

CVE-2006-0380

Disclosure Date: January 25, 2006 (last updated October 04, 2023)
A logic error in FreeBSD kernel 5.4-STABLE and 6.0 causes the kernel to calculate an incorrect buffer length, which causes more data to be copied to userland than intended, which could allow local users to read portions of kernel memory.
0
Attacker Value
Unknown

CVE-2006-0379

Disclosure Date: January 25, 2006 (last updated October 04, 2023)
FreeBSD kernel 5.4-STABLE and 6.0 does not completely initialize a buffer before making it available to userland, which could allow local users to read portions of kernel memory.
0
Attacker Value
Unknown

CVE-2006-0381

Disclosure Date: January 25, 2006 (last updated October 04, 2023)
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice.
0