Show filters
193 Total Results
Displaying 11-20 of 193
Sort by:
Attacker Value
Unknown

CVE-2022-48437

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.
Attacker Value
Unknown

CVE-2023-29323

Disclosure Date: April 04, 2023 (last updated October 08, 2023)
ascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable before 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
Attacker Value
Unknown

CVE-2023-27567

Disclosure Date: March 03, 2023 (last updated October 08, 2023)
In OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the kernel.
Attacker Value
Unknown

CVE-2022-27882

Disclosure Date: March 25, 2022 (last updated October 07, 2023)
slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.
Attacker Value
Unknown

CVE-2022-27881

Disclosure Date: March 25, 2022 (last updated October 07, 2023)
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
Attacker Value
Unknown

CVE-2010-4816

Disclosure Date: June 22, 2021 (last updated November 29, 2024)
It was found in FreeBSD 8.0, 6.3 and 4.9, and OpenBSD 4.6 that a null pointer dereference in ftpd/popen.c may lead to remote denial of service of the ftpd service.
Attacker Value
Unknown

CVE-2020-26142

Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
Attacker Value
Unknown

CVE-2020-16088

Disclosure Date: July 28, 2020 (last updated November 28, 2024)
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
Attacker Value
Unknown

CVE-2011-3336

Disclosure Date: February 12, 2020 (last updated February 21, 2025)
regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.
Attacker Value
Unknown

CVE-2019-19726

Disclosure Date: December 12, 2019 (last updated November 27, 2024)
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.