Show filters
201 Total Results
Displaying 21-30 of 201
Sort by:
Attacker Value
Unknown
CVE-2022-27882
Disclosure Date: March 25, 2022 (last updated February 23, 2025)
slaacd in OpenBSD 6.9 and 7.0 before 2022-03-22 has an integer signedness error and resultant heap-based buffer overflow triggerable by a crafted IPv6 router advertisement. NOTE: privilege separation and pledge can prevent exploitation.
0
Attacker Value
Unknown
CVE-2022-27881
Disclosure Date: March 25, 2022 (last updated February 23, 2025)
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
0
Attacker Value
Unknown
CVE-2010-4816
Disclosure Date: June 22, 2021 (last updated February 22, 2025)
It was found in FreeBSD 8.0, 6.3 and 4.9, and OpenBSD 4.6 that a null pointer dereference in ftpd/popen.c may lead to remote denial of service of the ftpd service.
0
Attacker Value
Unknown
CVE-2020-26142
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
0
Attacker Value
Unknown
CVE-2020-16088
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
0
Attacker Value
Unknown
CVE-2011-3336
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.
0
Attacker Value
Unknown
CVE-2019-19726
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
0
Attacker Value
Unknown
CVE-2019-14899
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.
0
Attacker Value
Unknown
CVE-2012-1577
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
0
Attacker Value
Unknown
CVE-2019-19520
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
0