Show filters
42 Total Results
Displaying 11-20 of 42
Sort by:
Attacker Value
Unknown
CVE-2006-6654
Disclosure Date: December 20, 2006 (last updated October 04, 2023)
The sendmsg function in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029, when run on a 64-bit architecture, allows attackers to cause a denial of service (kernel panic) via an invalid msg_controllen parameter to the sendit function.
0
Attacker Value
Unknown
CVE-2006-5215
Disclosure Date: October 10, 2006 (last updated October 04, 2023)
The Xsession script, as used by X Display Manager (xdm) in NetBSD before 20060212, X.Org before 20060317, and Solaris 8 through 10 before 20061006, allows local users to overwrite arbitrary files, or read another user's Xsession errors file, via a symlink attack on a /tmp/xses-$USER file.
0
Attacker Value
Unknown
CVE-2006-3202
Disclosure Date: June 23, 2006 (last updated October 04, 2023)
The ip6_savecontrol function in NetBSD 2.0 through 3.0, under certain configurations, does not check to see if IPv4-mapped sockets are being used before processing IPv6 socket options, which allows local users to cause a denial of service (crash) by creating an IPv4-mapped IPv6 socket with the SO_TIMESTAMP socket option set, then sending an IPv4 packet through the socket.
0
Attacker Value
Unknown
CVE-2006-1833
Disclosure Date: April 19, 2006 (last updated October 04, 2023)
Intel RNG Driver in NetBSD 1.6 through 3.0 may incorrectly detect the presence of the pchb interface, which will cause it to always generate the same random number, which allows remote attackers to more easily crack encryption keys generated from the interface.
0
Attacker Value
Unknown
CVE-2006-1814
Disclosure Date: April 18, 2006 (last updated October 04, 2023)
NetBSD 1.6, 2.0, 2.1 and 3.0 allows local users to cause a denial of service (memory exhaustion) by using the sysctl system call to lock a large buffer into physical memory.
0
Attacker Value
Unknown
CVE-2006-1797
Disclosure Date: April 18, 2006 (last updated October 04, 2023)
The kernel in NetBSD-current before September 28, 2005 allows local users to cause a denial of service (system crash) by using the SIOCGIFALIAS ioctl to gather information on a non-existent alias of a network interface, which causes a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2006-1589
Disclosure Date: April 03, 2006 (last updated February 22, 2025)
The elf_load_file function in NetBSD 2.0 through 3.0 allows local users to cause a denial of service (kernel crash) via an ELF interpreter that does not have a PT_LOAD section in its header, which triggers a null dereference.
0
Attacker Value
Unknown
CVE-2006-1588
Disclosure Date: April 03, 2006 (last updated February 22, 2025)
The bridge ioctl (if_bridge code) in NetBSD 1.6 through 3.0 does not clear sensitive memory before copying ioctl results to the requesting process, which allows local users to obtain portions of kernel memory.
0
Attacker Value
Unknown
CVE-2006-1587
Disclosure Date: April 03, 2006 (last updated February 22, 2025)
NetBSD 1.6 up to 3.0, when a user has "set record" in .mailrc with the default umask set, creates the record file with 0644 permissions, which allows local users to read the record file.
0
Attacker Value
Unknown
CVE-2006-0145
Disclosure Date: January 09, 2006 (last updated February 22, 2025)
The kernfs_xread function in kernfs in NetBSD 1.6 through 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges via the lseek system call.
0