Show filters
531 Total Results
Displaying 211-220 of 531
Sort by:
Attacker Value
Unknown

CVE-2014-7250

Disclosure Date: December 12, 2014 (last updated October 05, 2023)
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote attackers to cause a denial of service (resource consumption) via crafted packets.
0
Attacker Value
Unknown

CVE-2014-8475

Disclosure Date: November 18, 2014 (last updated October 05, 2023)
FreeBSD 9.1, 9.2, and 10.0, when compiling OpenSSH with Kerberos support, uses incorrect library ordering when linking sshd, which causes symbols to be resolved incorrectly and allows remote attackers to cause a denial of service (sshd deadlock and prevention of new connections) by ending multiple connections before authentication is completed.
0
Attacker Value
Unknown

CVE-2014-8476

Disclosure Date: November 13, 2014 (last updated October 05, 2023)
The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.
0
Attacker Value
Unknown

CVE-2014-3711

Disclosure Date: October 27, 2014 (last updated October 05, 2023)
namei in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (memory exhaustion) via vectors that trigger a sandboxed process to look up a large number of nonexistent path names.
0
Attacker Value
Unknown

CVE-2014-3955

Disclosure Date: October 27, 2014 (last updated October 05, 2023)
routed in FreeBSD 8.4 through 10.1-RC2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RIP request from a source not on a directly connected network.
0
Attacker Value
Unknown

CVE-2014-3954

Disclosure Date: October 27, 2014 (last updated October 05, 2023)
Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.
0
Attacker Value
Unknown

CVE-2014-5384

Disclosure Date: August 21, 2014 (last updated October 05, 2023)
The VIQR module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (out-of-bounds array access) via a crafted argument to the iconv_open function. NOTE: this issue was SPLIT from CVE-2014-3951 per ADT2 due to different vulnerability types.
0
Attacker Value
Unknown

CVE-2014-3951

Disclosure Date: August 21, 2014 (last updated October 05, 2023)
The HZ module in the iconv implementation in FreeBSD 10.0 before p6 and NetBSD allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted argument to the iconv_open function. NOTE: this issue was SPLIT per ADT2 due to different vulnerability types. CVE-2014-5384 is used for the NULL pointer dereference.
0
Attacker Value
Unknown

CVE-2014-3952

Disclosure Date: July 15, 2014 (last updated October 05, 2023)
FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize the buffer between the header and data of a control message, which allows local users to obtain sensitive information from kernel memory via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-3953

Disclosure Date: July 15, 2014 (last updated October 05, 2023)
FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.
0