Vulnerabilities > Freebsd > Freebsd > 5.3

DATE CVE VULNERABILITY TITLE RISK
2006-03-23 CVE-2006-0905 A "programming error" in fast_ipsec in FreeBSD 4.8-RELEASE through 6.1-STABLE and NetBSD 2 through 3 does not properly update the sequence number associated with a Security Association, which allows packets to pass sequence number checks and allows remote attackers to capture IPSec packets and conduct replay attacks.
network
low complexity
freebsd netbsd
7.5
2006-03-07 CVE-2006-0883 Resource Management Errors vulnerability in multiple products
OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
network
low complexity
openbsd freebsd CWE-399
5.0
2006-02-02 CVE-2006-0433 Remote Denial Of Service vulnerability in FreeBSD TCP SACK
Selective Acknowledgement (SACK) in FreeBSD 5.3 and 5.4 does not properly handle an incoming selective acknowledgement when there is insufficient memory, which might allow remote attackers to cause a denial of service (infinite loop).
network
low complexity
freebsd
5.0
2006-01-25 CVE-2006-0381 Remote Denial Of Service vulnerability in Freebsd 5.3/5.4/6.0
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice.
network
low complexity
freebsd
5.0
2006-01-11 CVE-2006-0055 Unspecified vulnerability in Freebsd
The ispell_op function in ee on FreeBSD 4.10 to 6.0 uses predictable filenames and does not confirm which file is being written, which allows local users to overwrite arbitrary files via a symlink attack when ee invokes ispell.
local
low complexity
freebsd
2.1
2005-08-05 CVE-2005-2359 Authentication Constant Key Usage vulnerability in BSD IPsec Session AES-XCBC-MAC
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets to establish an IPsec session.
network
low complexity
freebsd
5.0
2005-07-26 CVE-2005-2218 Unspecified vulnerability in Freebsd
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
local
low complexity
freebsd
7.2
2005-07-05 CVE-2005-2068 Unspecified vulnerability in Freebsd
FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
network
low complexity
freebsd
5.0
2005-05-31 CVE-2005-0356 Remote Denial Of Service vulnerability in Multiple Vendor TCP Timestamp PAWS
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
5.0
2005-05-06 CVE-2005-1406 Local Kernel Memory Disclosure vulnerability in FreeBSD
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
local
low complexity
freebsd
4.6