Vulnerabilities > Freebsd > Freebsd > 6.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-03-04 | CVE-2008-1148 | A certain pseudo-random number generator (PRNG) algorithm that uses ADD with 0 random hops (aka "Algorithm A0"), as used in OpenBSD 3.5 through 4.2 and NetBSD 1.6.2 through 4.0, allows remote attackers to guess sensitive values such as (1) DNS transaction IDs or (2) IP fragmentation IDs by observing a sequence of previously generated values. | 6.8 |
2008-03-04 | CVE-2008-1146 | A certain pseudo-random number generator (PRNG) algorithm that uses XOR and 3-bit random hops (aka "Algorithm X3"), as used in OpenBSD 2.8 through 4.2, allows remote attackers to guess sensitive values such as DNS transaction IDs by observing a sequence of previously generated values. | 6.8 |
2008-02-15 | CVE-2008-0777 | Permissions, Privileges, and Access Controls vulnerability in Freebsd The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files. | 4.9 |
2008-01-16 | CVE-2008-0217 | Permissions, Privileges, and Access Controls vulnerability in Freebsd The script program in FreeBSD 5.0 through 7.0-PRERELEASE invokes openpty, which creates a pseudo-terminal with world-readable and world-writable permissions when it is not run as root, which allows local users to read data from the terminal of the user running script. | 6.9 |
2008-01-16 | CVE-2008-0216 | Permissions, Privileges, and Access Controls vulnerability in Freebsd The ptsname function in FreeBSD 6.0 through 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the pty from another user. | 2.1 |
2008-01-16 | CVE-2008-0122 | Numeric Errors vulnerability in ISC Bind Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption. | 10.0 |
2007-11-30 | CVE-2007-6150 | Information Exposure vulnerability in Freebsd The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 through 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms that rely on secrecy of those values. | 2.1 |
2007-07-16 | CVE-2007-3798 | Unchecked Return Value vulnerability in multiple products Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value. | 9.8 |
2007-04-25 | CVE-2007-2242 | Denial of Service vulnerability in IPv6 Protocol Type 0 Route Header The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. | 7.8 |
2007-03-28 | CVE-2007-1719 | Local Security vulnerability in Jason W. Bacon Mcweject 0.9 Buffer overflow in eject.c in Jason W. | 7.2 |