Total
187 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2004-0221 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 5.0 MEDIUM | N/A |
isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a delete payload containing a large number of SPIs, which triggers an out-of-bounds read error, as demonstrated by the Striker ISAKMP Protocol Test Suite. | |||||
CVE-2004-0219 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 5.0 MEDIUM | N/A |
isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (crash) via an ISAKMP packet with a malformed IPSEC SA payload, as demonstrated by the Striker ISAKMP Protocol Test Suite. | |||||
CVE-2004-0220 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 10.0 HIGH | N/A |
isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service via an ISAKMP packet with a malformed Cert Request payload, which causes an integer underflow that is used in a malloc operation that is not properly handled, as demonstrated by the Striker ISAKMP Protocol Test Suite. | |||||
CVE-2004-0222 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 5.0 MEDIUM | N/A |
Multiple memory leaks in isakmpd in OpenBSD 3.4 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via certain ISAKMP packets, as demonstrated by the Striker ISAKMP Protocol Test Suite. | |||||
CVE-2004-0218 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 5.0 MEDIUM | N/A |
isakmpd in OpenBSD 3.4 and earlier allows remote attackers to cause a denial of service (infinite loop) via an ISAKMP packet with a zero-length payload, as demonstrated by the Striker ISAKMP Protocol Test Suite. | |||||
CVE-2001-1415 | 1 Openbsd | 1 Openbsd | 2017-07-10 | 4.6 MEDIUM | N/A |
vi.recover in OpenBSD before 3.1 allows local users to remove arbitrary zero-byte files such as device nodes. | |||||
CVE-2016-6247 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
OpenBSD 5.8 and 5.9 allows certain local users to cause a denial of service (kernel panic) by unmounting a filesystem with an open vnode on the mnt_vnodelist. | |||||
CVE-2016-6242 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (assertion failure and kernel panic) via a large ident value in a kevent system call. | |||||
CVE-2016-6522 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
Integer overflow in the uvm_map_isavail function in uvm/uvm_map.c in OpenBSD 5.9 allows local users to cause a denial of service (kernel panic) via a crafted mmap call, which triggers the new mapping to overlap with an existing mapping. | |||||
CVE-2016-6350 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (NULL pointer dereference and panic) via a sysctl call with a path starting with 10,9. | |||||
CVE-2016-6246 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 4.4 MEDIUM |
OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node. | |||||
CVE-2016-6245 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a large size in a getdents system call. | |||||
CVE-2016-6243 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 4.9 MEDIUM | 5.5 MEDIUM |
thrsleep in kern/kern_synch.c in OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a crafted value in the tsp parameter of the __thrsleep system call. | |||||
CVE-2016-6244 | 1 Openbsd | 1 Openbsd | 2017-03-08 | 7.8 HIGH | 7.5 HIGH |
The sys_thrsigdivert function in kern/kern_sig.c in the OpenBSD kernel 5.9 allows remote attackers to cause a denial of service (panic) via a negative "ts.tv_sec" value. | |||||
CVE-2007-1365 | 1 Openbsd | 1 Openbsd | 2016-10-17 | 10.0 HIGH | N/A |
Buffer overflow in kern/uipc_mbuf2.c in OpenBSD 3.9 and 4.0 allows remote attackers to execute arbitrary code via fragmented IPv6 packets due to "incorrect mbuf handling for ICMP6 packets." NOTE: this was originally reported as a denial of service. | |||||
CVE-2004-1799 | 1 Openbsd | 1 Openbsd | 2016-10-17 | 7.5 HIGH | N/A |
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote attackers to bypass intended packet filters via spoofed packets to other interfaces. | |||||
CVE-2003-0955 | 1 Openbsd | 1 Openbsd | 2016-10-17 | 4.6 MEDIUM | N/A |
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow. | |||||
CVE-2003-0078 | 3 Freebsd, Openbsd, Openssl | 3 Freebsd, Openbsd, Openssl | 2016-10-17 | 5.0 MEDIUM | N/A |
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack." | |||||
CVE-2002-1420 | 1 Openbsd | 1 Openbsd | 2016-10-17 | 7.2 HIGH | N/A |
Integer signedness error in select() on OpenBSD 3.1 and earlier allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a data copying operation. | |||||
CVE-2002-0701 | 2 Freebsd, Openbsd | 2 Freebsd, Openbsd | 2016-10-17 | 2.1 LOW | N/A |
ktrace in BSD-based operating systems allows the owner of a process with special privileges to trace the process after its privileges have been lowered, which may allow the owner to obtain sensitive information that the process obtained while it was running with the extra privileges. |