Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2020-26142

Disclosure Date: May 11, 2021 (last updated February 22, 2025)
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
Attacker Value
Unknown

CVE-2019-19521

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
Attacker Value
Unknown

CVE-2019-19520

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
Attacker Value
Unknown

CVE-2019-19519

Disclosure Date: December 05, 2019 (last updated November 27, 2024)
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
Attacker Value
Unknown

CVE-2019-19522

Disclosure Date: August 08, 2019 (last updated November 27, 2024)
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.