Vulnerabilities > Freebsd > Freebsd > 4.3

DATE CVE VULNERABILITY TITLE RISK
2001-08-23 CVE-2001-1155 Incorrect Authorization vulnerability in Freebsd 4.1.1/4.2/4.3
TCP Wrappers (tcp_wrappers) in FreeBSD 4.1.1 through 4.3 with the PARANOID ACL option enabled does not properly check the result of a reverse DNS lookup, which could allow remote attackers to bypass intended access restrictions via DNS spoofing.
network
low complexity
freebsd CWE-863
critical
9.8
2001-08-21 CVE-2001-1166 Unspecified vulnerability in Freebsd
linprocfs on FreeBSD 4.3 and earlier does not properly restrict access to kernel memory, which allows one process with debugging rights on a privileged process to read restricted memory from that process.
network
low complexity
freebsd
5.0
2001-08-17 CVE-2001-1145 Directory Traversal Race Condition vulnerability in Multiple BSD FTS
fts routines in FreeBSD 4.3 and earlier, NetBSD before 1.5.2, and OpenBSD 2.9 and earlier can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform dangerous actions on the wrong directories.
local
high complexity
freebsd netbsd openbsd
6.2
2001-08-14 CVE-2001-0554 Classic Buffer Overflow vulnerability in multiple products
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
network
low complexity
netkit mit sgi freebsd ibm netbsd openbsd sun debian CWE-120
critical
10.0
2001-07-10 CVE-2001-1180 Unspecified vulnerability in Freebsd
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
local
low complexity
freebsd
7.2
2001-07-07 CVE-2001-1244 Denial of Service vulnerability in Multiple Vendor Small TCP MSS
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
network
low complexity
freebsd hp linux microsoft netbsd openbsd sun
5.0