Vulnerabilities
Vulnerable Software
Freebsd:  >> Freebsd  >> 2.2  Security Vulnerabilities
Race condition in the UFS and EXT2FS file systems in FreeBSD 4.2 and earlier, and possibly other operating systems, makes deleted data available to user processes before it is zeroed out, which allows a local user to access otherwise restricted information.
CVSS Score
6.2
EPSS Score
0.001
Published
2001-06-18
IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port.
CVSS Score
7.5
EPSS Score
0.034
Published
2001-06-18
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
CVSS Score
2.1
EPSS Score
0.001
Published
2000-05-29
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
CVSS Score
5.0
EPSS Score
0.014
Published
1999-12-30
FreeBSD mount_union command allows local users to gain root privileges via a symlink attack.
CVSS Score
7.2
EPSS Score
0.001
Published
1999-12-01
FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system.
CVSS Score
5.5
EPSS Score
0.002
Published
1998-06-16
FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing attacks.
CVSS Score
7.5
EPSS Score
0.005
Published
1998-05-01
FreeBSD mmap function allows users to modify append-only or immutable files.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-02-20
mmap function in BSD allows local attackers in the kmem group to modify memory through devices.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-02-01
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
CVSS Score
5.0
EPSS Score
0.007
Published
1998-02-01


Contact Us

Shodan ® - All rights reserved