Vulnerabilities > Freebsd

DATE CVE VULNERABILITY TITLE RISK
2005-12-31 CVE-2005-4351 Local Security vulnerability in kernel
The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.
local
low complexity
dragonfly freebsd linux openbsd
4.3
2005-08-05 CVE-2005-2359 Authentication Constant Key Usage vulnerability in BSD IPsec Session AES-XCBC-MAC
The AES-XCBC-MAC algorithm in IPsec in FreeBSD 5.3 and 5.4, when used for authentication without other encryption, uses a constant key instead of the one that was assigned by the system administrator, which can allow remote attackers to spoof packets to establish an IPsec session.
network
low complexity
freebsd
5.0
2005-07-26 CVE-2005-2218 Unspecified vulnerability in Freebsd
The device file system (devfs) in FreeBSD 5.x does not properly check parameters of the node type when creating a device node, which makes hidden devices available to attackers, who can then bypass restrictions on a jailed process.
local
low complexity
freebsd
7.2
2005-07-05 CVE-2005-2068 Unspecified vulnerability in Freebsd
FreeBSD 4.x through 4.11 and 5.x through 5.4 allows remote attackers to modify certain TCP options via a TCP packet with the SYN flag set for an already established session.
network
low complexity
freebsd
5.0
2005-07-05 CVE-2005-2019 Unspecified vulnerability in Freebsd 5.4
ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache results to be corrupted during multiple concurrent lookups, allowing remote attackers to bypass intended access restrictions.
network
low complexity
freebsd
5.0
2005-05-31 CVE-2005-0356 Remote Denial Of Service vulnerability in Multiple Vendor TCP Timestamp PAWS
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old.
5.0
2005-05-06 CVE-2005-1406 Local Kernel Memory Disclosure vulnerability in FreeBSD
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
local
low complexity
freebsd
4.6
2005-05-06 CVE-2005-1400 Unspecified vulnerability in Freebsd
The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.
local
low complexity
freebsd
4.6
2005-05-06 CVE-2005-1399 Unspecified vulnerability in Freebsd
FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver.
local
low complexity
freebsd
4.6
2005-05-02 CVE-2005-1036 Missing Initialization of Resource vulnerability in Freebsd
FreeBSD 5.x to 5.4 on AMD64 does not properly initialize the IO permission bitmap used to allow user access to certain hardware, which allows local users to bypass intended access restrictions to cause a denial of service, obtain sensitive information, and possibly gain privileges.
local
low complexity
freebsd CWE-909
7.8