Show filters
201 Total Results
Displaying 31-40 of 201
Sort by:
Attacker Value
Unknown

CVE-2019-19521

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Attacker Value
Unknown

CVE-2019-19519

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
Attacker Value
Unknown

CVE-2019-8460

Disclosure Date: August 26, 2019 (last updated November 27, 2024)
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
Attacker Value
Unknown

CVE-2019-19522

Disclosure Date: August 08, 2019 (last updated November 27, 2024)
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
Attacker Value
Unknown

CVE-2018-14775

Disclosure Date: August 01, 2018 (last updated November 27, 2024)
tss_alloc in sys/arch/i386/i386/gdt.c in OpenBSD 6.2 and 6.3 has a Local Denial of Service (system crash) due to incorrect I/O port access control on the i386 architecture.
0
Attacker Value
Unknown

CVE-2017-1000372

Disclosure Date: June 19, 2017 (last updated November 26, 2024)
A flaw exists in OpenBSD's implementation of the stack guard page that allows attackers to bypass it resulting in arbitrary code execution using setuid binaries such as /usr/bin/at. This affects OpenBSD 6.1 and possibly earlier versions.
0
Attacker Value
Unknown

CVE-2017-1000373

Disclosure Date: June 19, 2017 (last updated November 26, 2024)
The OpenBSD qsort() function is recursive, and not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N/4 times. This allows attackers to consume arbitrary amounts of stack memory and manipulate stack memory to assist in arbitrary code execution attacks. This affects OpenBSD 6.1 and possibly earlier versions.
0
Attacker Value
Unknown

CVE-2017-5850

Disclosure Date: March 27, 2017 (last updated November 26, 2024)
httpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a series of requests for a large file using an HTTP Range header.
0
Attacker Value
Unknown

CVE-2016-6239

Disclosure Date: March 07, 2017 (last updated November 26, 2024)
The mmap extension __MAP_NOFAULT in OpenBSD 5.8 and 5.9 allows attackers to cause a denial of service (kernel panic and crash) via a large size value.
0
Attacker Value
Unknown

CVE-2016-6247

Disclosure Date: March 07, 2017 (last updated November 26, 2024)
OpenBSD 5.8 and 5.9 allows certain local users to cause a denial of service (kernel panic) by unmounting a filesystem with an open vnode on the mnt_vnodelist.
0