Show filters
321 Total Results
Displaying 151-160 of 321
Sort by:
Attacker Value
Unknown

CVE-2006-6730

Disclosure Date: December 26, 2006 (last updated October 04, 2023)
OpenBSD and NetBSD permit usermode code to kill the display server and write to the X.Org /dev/xf86 device, which allows local users with root privileges to reduce securelevel by replacing the System Management Mode (SMM) handler via a write to an SMRAM address within /dev/xf86 (aka the video card memory-mapped I/O range), and then launching the new handler via a System Management Interrupt (SMI), as demonstrated by a write to Programmed I/O port 0xB2.
0
Attacker Value
Unknown

CVE-2006-6397

Disclosure Date: December 08, 2006 (last updated November 08, 2023)
Integer overflow in banner/banner.c in FreeBSD, NetBSD, and OpenBSD might allow local users to modify memory via a long banner. NOTE: CVE and multiple third parties dispute this issue. Since banner is not setuid, an exploit would not cross privilege boundaries in normal operations. This issue is not a vulnerability
0
Attacker Value
Unknown

CVE-2006-6164

Disclosure Date: November 29, 2006 (last updated October 04, 2023)
The _dl_unsetenv function in loader.c in the ELF ld.so in OpenBSD 3.9 and 4.0 does not properly remove duplicate environment variables, which allows local users to pass dangerous variables such as LD_PRELOAD to loading processes, which might be leveraged to gain privileges.
0
Attacker Value
Unknown

CVE-2006-5550

Disclosure Date: October 26, 2006 (last updated October 04, 2023)
The kernel in FreeBSD 6.1 and OpenBSD 4.0 allows local users to cause a denial of service via unspecified vectors involving certain ioctl requests to /dev/crypto.
0
Attacker Value
Unknown

CVE-2006-5229

Disclosure Date: October 10, 2006 (last updated October 04, 2023)
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. NOTE: as of 20061014, it appears that this issue is dependent on the use of manually-set passwords that causes delays when processing /etc/shadow due to an increased number of rounds.
0
Attacker Value
Unknown

CVE-2006-5218

Disclosure Date: October 10, 2006 (last updated October 04, 2023)
Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.
0
Attacker Value
Unknown

CVE-2006-4925

Disclosure Date: September 29, 2006 (last updated October 04, 2023)
packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
0
Attacker Value
Unknown

CVE-2006-5051

Disclosure Date: September 27, 2006 (last updated February 03, 2024)
Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
Attacker Value
Unknown

CVE-2006-5052

Disclosure Date: September 27, 2006 (last updated October 04, 2023)
Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
0
Attacker Value
Unknown

CVE-2006-4924

Disclosure Date: September 27, 2006 (last updated October 04, 2023)
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
0