Show filters
104 Total Results
Displaying 71-80 of 104
Sort by:
Attacker Value
Unknown
CVE-2018-6925
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
In FreeBSD before 11.2-STABLE(r338986), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338985), and 10.4-RELEASE-p13, due to improper maintenance of IPv6 protocol control block flags through various failure paths, an unprivileged authenticated local user may be able to cause a NULL pointer dereference causing the kernel to crash.
0
Attacker Value
Unknown
CVE-2018-6924
Disclosure Date: September 12, 2018 (last updated November 27, 2024)
In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p3, 11.1-RELEASE-p14, 10.4-STABLE, and 10.4-RELEASE-p12, insufficient validation in the ELF header parser could allow a malicious ELF binary to cause a kernel crash or disclose kernel memory.
0
Attacker Value
Unknown
CVE-2018-6923
Disclosure Date: September 04, 2018 (last updated November 27, 2024)
In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.
0
Attacker Value
Unknown
CVE-2018-6922
Disclosure Date: August 09, 2018 (last updated November 27, 2024)
One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.
0
Attacker Value
Unknown
The BSD libc library's link_ntoa() function may be vulnerable to a classic buff…
Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c of the BSD libc library may allow an attacker to read or write from memory. The full impact and severity depends on the method of exploit and how the library is used by applications. According to analysis by FreeBSD developers, it is very unlikely that applications exist that utilize link_ntoa() in an exploitable manner, and the CERT/CC is not aware of any proof of concept. A blog post describes the functionality of link_ntoa() and points out that none of the base utilities use this function in an exploitable manner. For more information, please see FreeBSD Security Advisory SA-16:37.
0
Attacker Value
Unknown
CVE-2018-3665
Disclosure Date: June 21, 2018 (last updated November 26, 2024)
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
0
Attacker Value
Unknown
CVE-2016-9042
Disclosure Date: June 04, 2018 (last updated November 08, 2023)
An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.
0
Attacker Value
Unknown
CVE-2017-1081
Disclosure Date: April 10, 2018 (last updated November 26, 2024)
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
0
Attacker Value
Unknown
CVE-2018-7183
Disclosure Date: March 08, 2018 (last updated November 26, 2024)
Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array.
0
Attacker Value
Unknown
CVE-2017-13088
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0