Show filters
321 Total Results
Displaying 41-50 of 321
Sort by:
Attacker Value
Unknown
CVE-2020-26142
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
0
Attacker Value
Unknown
CVE-2021-28041
Disclosure Date: March 05, 2021 (last updated February 22, 2025)
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
0
Attacker Value
Unknown
CVE-2020-16088
Disclosure Date: July 28, 2020 (last updated February 21, 2025)
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
0
Attacker Value
Unknown
CVE-2020-15778
Disclosure Date: July 24, 2020 (last updated February 21, 2025)
scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
0
Attacker Value
Unknown
CVE-2020-12062
Disclosure Date: June 01, 2020 (last updated February 21, 2025)
The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client's download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that "this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol" and "utimes does not fail under normal circumstances.
0
Attacker Value
Unknown
CVE-2011-3336
Disclosure Date: February 12, 2020 (last updated February 21, 2025)
regcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion.
0
Attacker Value
Unknown
CVE-2015-5333
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Memory leak in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (memory consumption) via a large number of ASN.1 object identifiers in X.509 certificates.
0
Attacker Value
Unknown
CVE-2015-5334
Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Off-by-one error in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (program crash) or possible execute arbitrary code via a crafted X.509 certificate, which triggers a stack-based buffer overflow. Note: this vulnerability exists because of an incorrect fix for CVE-2014-3508.
0
Attacker Value
Unknown
CVE-2012-5663
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
The isearch package (textproc/isearch) before 1.47.01nb1 uses the tempnam() function to create insecure temporary files into a publicly-writable area (/tmp).
0
Attacker Value
Unknown
CVE-2019-19726
Disclosure Date: December 12, 2019 (last updated November 27, 2024)
OpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in setuid programs can be defeated by setting a very small RLIMIT_DATA resource limit. When executing chpass or passwd (which are setuid root), _dl_setup_env in ld.so tries to strip LD_LIBRARY_PATH from the environment, but fails when it cannot allocate memory. Thus, the attacker is able to execute their own library code as root.
0