what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 190 RSS Feed

Files from The FreeBSD Project

Email addresssecurity at freebsd.org
First Active2000-04-11
Last Active2006-10-04
FreeBSD Security Advisory 2002.17
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:17 - The mod_frontpage port prior to version mod_portname-1.6.1 contains several remotely exploitable buffer overflows in the fpexec wrapper, which is installed setuid root.

tags | overflow, root
systems | freebsd
SHA-256 | 6baaa26e93cb19abe4d52eaea219513b94a7b57aba7a390dac5d9e0085650a3b
FreeBSD Security Advisory 2002.16
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:16 - Versions 4.76 and earlier of the Netscape browser will execute JavaScript contained in gif and jpeg comment blocks, allowing a hostile web server to see what is in your cache.

tags | web, javascript
systems | freebsd
SHA-256 | 01e68c967241355e54d0dbda9dfd7c8b5b192f70e3f4324fc7e3b5072fa315c0
FreeBSD Security Advisory 2002.15
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:15 - The port of the cyrus-sasl library prior to v1.5.24_8 contains a format string overflow in the syslog() call. Applications linked to that library could be affected.

tags | overflow
systems | freebsd
SHA-256 | ca1331948c84e83bcb66af1dcea4f17326b3ce7aa470a48f16bd1f4ffb9e66d8
FreeBSD Security Advisory 2002.14
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:14.pam-pgsql - The pam-pgsql port prior to v0.5.2 contains a vulnerability which allows remote users to cause arbitrary SQL code to be executed because the username and password given are inserted into a SQL statement with no safety checks.

tags | remote, arbitrary
systems | freebsd
SHA-256 | 6e3b0e22ccea6f55953d641696c316bff3e1aa4a2c38403ddae911b7abdcd9c8
FreeBSD Security Advisory 2002.13
Posted Mar 8, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:13 - OpenSSH v2.0 through v3.0.2p1 contains an exploitable off by one error which allows a authenticated users to run code on the server as root. A malicious server may be able to cause a connecting ssh client to execute arbitrary code with the privileges of the client user.

tags | arbitrary, root
systems | freebsd
SHA-256 | 6e00a15a25f7c776b080a9774af5d1a759451941a7cc0974c0c1dd73246b699c
FreeBSD Security Advisory 2002.12
Posted Feb 22, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:12 - The Squid port prior to 2.4-STABLE4 (port version 2.4_8) contains multiple vulnerabilities, one of which allows authenticated users to overflow buffers.

tags | overflow, vulnerability
systems | freebsd
SHA-256 | 1a89bdd97fc0eaf82c8056c30c781e3f2f7edf55cdeccb3df1b3340926245421
FreeBSD Security Advisory 2002.11
Posted Feb 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:11 - ucd-snmp/net-snmp remotely exploitable vulnerabilities. The Net-SNMP (previously known as UCD-SNMP) package is a set of Simple Network Management Protocol tools, including an agent, library, and applications for generating and handling requests and traps. The Net-SNMP port, versions prior to 4.2.3, contains several remotely exploitable vulnerabilities which includes SNMPv1 request and trap handling in both managers and agents.

tags | vulnerability, protocol
systems | freebsd
SHA-256 | a695d1e35a3555f83b9d23ae5c4a7df964abe0ac453434ab6954eb289cc8d84b
FreeBSD Security Advisory 2002.8
Posted Jan 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:08 - A race condition during exec allows local root compromise. A race condition exists in the FreeBSD exec system call implementation. It is possible for a user to attach a debugger to a process while it is exec'ing, but before the kernel has determined that the process is set-user-ID or set-group-ID. All versions of FreeBSD 4.x prior to FreeBSD 4.5-RELEASE are vulnerable to this problem. The problem has been corrected by marking processes that have started.

tags | kernel, local, root
systems | freebsd
SHA-256 | e39b7337b2653475b68a0ab6e1689bf3692bf6483d1a3ef99c45b26407ae0464
FreeBSD Security Advisory 2002.7
Posted Jan 19, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:07 - The k5su command included with FreeBSD, versions prior to 4.5-RELEASE, and the su command included in the heimdal port, versions prior to heimdal-0.4e_2, use the getlogin system call in order to determine whether the currently logged-in user is 'root'. In some circumstances, it is possible for a non-privileged process to have 'root' as the login name returned by getlogin. You don't actually want that to happen, trust us.

tags | root
systems | freebsd
SHA-256 | 53875598a31417450b640a6ead62cd1ba3c1efd31d8d7e05c0c072b13bc5bca6
FreeBSD Security Advisory 2002.6
Posted Jan 17, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:06 - The sudo port prior to sudo-1.6.4.1 contains a local root vulnerability. If a user who has not been authorized by the system administrator (listed in the 'sudoers' file) attempts to use sudo, sudo will send an email alert. When it does so, it invokes the system mailer with superuser privileges, and with most of the user's environment intact.

tags | local, root
systems | freebsd
SHA-256 | 95d8394d5117d9a6f3521370ab41a96912996869f60e721be66457c59168ec22
FreeBSD Security Advisory 2002.5
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:05 - The pine port, versions previous to pine-4.40, handles URLs in messages insecurely. PINE allows users to launch a web browser to visit a URL embedded in a message. Due to a programming error, PINE does not properly escape meta-characters in the URL before passing it to the command shell as an argument to the web browser.

tags | web, shell
systems | freebsd
SHA-256 | bd35deff33ef609e251b486734b4b234a56114ded09699be08f3d6b9fa3ad22e
FreeBSD Security Advisory 2002.1
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:01 - Pkg_add allows local attackers to modify the package contents and potentially elevate privileges or otherwise compromise the system.

tags | local
systems | freebsd
SHA-256 | 731e85f42f619ca54425288be3cb87d0686a3e9b2f984c421c4359cbf121f100
FreeBSD Security Advisory 2002.4
Posted Jan 8, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:04 - The mutt ports, versions prior to mutt-1.2.25_1 and mutt-devel-1.3.24_2, contain a buffer overflow in the handling of email addresses in headers.

tags | overflow
systems | freebsd
SHA-256 | 6464640afeffbb8d80576dd583eb27af4174a3e9efeeb58196d1a98b1625fbed
FreeBSD Security Advisory 2002.3
Posted Jan 8, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:03 - The mod_auth_pgsql port, versions prior to mod_auth_pgsql-0.9.9, contain a vulnerability that may allow a remote user to cause arbitrary SQL code to be execute. mod_auth_pgsql constructs a SQL statement to be executed by the PostgreSQL server in order to lookup user information. The username given by the remote user is inserted into the SQL statement without any quoting or other safety checks.

tags | remote, arbitrary
systems | freebsd
SHA-256 | 5f769d230b41592e415fa574769fd87226cc6e898a2af4b5608b7a041bbdb895
FreeBSD Security Advisory 2002.2
Posted Jan 8, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:02 - When creating, removing, or modifying system users, the pw utility modifies the system password file '/etc/master.passwd'. This file contains the users' encrypted passwords and is normally only readable by root. During the modification, a temporary copy of the file is created. However, this temporary file is mistakenly created with permissions that allow it to be read by any user. A race condition is created.

tags | root
systems | freebsd
SHA-256 | 1bca2b877dbf7bc0f01b60bb2153ba2303a661e6157a04f5d85a15c9e26d28d6
FreeBSD Security Advisory 2001.68
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:68 - The XSane port has insecure temp file vulnerabilities allowing local users to overwrite files by exploiting a race condition.

tags | local, vulnerability
systems | freebsd
SHA-256 | 13a8acd9ec717a5886e42bcf5e561d7bb8a8fd1f23abc51ef6013571ccd76bc0
FreeBSD Security Advisory 2001.67
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:67 - Htsearch, part of the htdig port, contains remote denial of service vulnerabilities. It also can allow files on the webserver to be written, but only if the attacker can anon-ftp in files. Version 3.1.5 and below are affected.

tags | remote, denial of service, vulnerability
systems | freebsd
SHA-256 | c0535815b894fe6e442f2f4287ca788e2a7c57797fa9aac8ba3b5ac9b0612ddd
FreeBSD Security Advisory 2001.65
Posted Dec 13, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:65 - Libgtop, a library for the Gnome top command, has a stack overflow affecting versions prior to libgtop-1.0.12_1. Libgtop runs as group kmem, allowing local users to read from kernel memory can monitor privileged data such as network traffic, disk buffers and terminal activity.

tags | overflow, kernel, local
systems | freebsd
SHA-256 | 04f866fbe894a8ee150bd60466ea765785d534719c8addaed7c08038ebdc7559
FreeBSD Security Advisory 2001.64
Posted Dec 9, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:64.wu-ftpd - Wu-ftpd v2.6.1 and below contains a remote root vulnerability which allows ftp users with anonymous accounts or user accounts to execute code. This may be accomplished by inserting invalid globbing parameters which are incorrectly parsed by the FTP server into command input.

tags | remote, root
systems | freebsd
SHA-256 | bed19099b553f8ec342c3bbd33c003a2357327bf9a9abe5d374c316e9b571004
FreeBSD Security Advisory 2001.63
Posted Dec 9, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:63.openssh - OpenSSH prior to v3.0.2 has a remote root vulnerability, but only if the administrator set 'UseLogin yes' in the sshd_config file.

tags | remote, root
systems | freebsd
SHA-256 | 521f8bbae1b8707730186dbfe6ec79cfdbb5d86ffe92ddf46345ae69a14b59d4
FreeBSD Security Advisory 2001.62
Posted Oct 11, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:62.uucp - Taylor UUCP is incorrectly configured by default, allowing local users to run commands as the uucp user and dialer group, allowing local root access.

tags | local, root
systems | freebsd
SHA-256 | 797e95c03a16117c03ba2eaab3ffdcd1c0a46ef1136c97236d76b2631c524cef
FreeBSD Security Advisory 2001.61
Posted Oct 11, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:61 - If the squid proxy port is configured in acceleration-only mode, ACL's are ignored, allowing a remote attacker to use the squid server in order to issue requests to hosts that are otherwise inaccessible. Because the squid server processes these requests as HTTP requests, the attacker cannot send or retrieve arbitrary data. However, the attacker could use squid's response to determine if a particular port is open on a victim host. Therefore, the squid server may be used to conduct a port scan.

tags | remote, web, arbitrary
systems | freebsd
SHA-256 | d7afc519a56bcddfcb9d5838ba965cce7299010dcb9428d5dd7ea0cf54a41246
FreeBSD Security Advisory 2001.60
Posted Sep 27, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:60 - Procmail versions prior to procmail 3.20 performed unsafe actions while in the signal handlers. If a signal is delivered while procmail is already in an unsafe signal handler, undefined behavior may result, possibly leading to the ability to perform actions as the superuser under unprivileged local user control.

tags | local
systems | freebsd
SHA-256 | a15e547ec286cb5b926fcb77bad3b9f6485a830f74e96e8d626520438447fb28
FreeBSD Security Advisory 2001.59
Posted Sep 8, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:59 - The infrequently used rmuser command exposes the master.passwd file to all users for an instant.

systems | freebsd
SHA-256 | 45d58a81cf33c8b0c5bbeb03f86e5520d0c454827c9ad2b0ea45917766b6295f
FreeBSD Security Advisory 2001.58
Posted Sep 1, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:58 - Users on the local machine or on remote systems which are allowed to access the local line printer daemon may be able to cause a buffer overflow. Submitting a specially-crafted incomplete print job and subsequently requesting a display of the printer queue, a static buffer overflow may be triggered, causing arbitrary code to be executed on the machine as root. In order to remotely exploit this vulnerability, the remote machine must be given access to the local printer daemon via a hostname entry in /etc/hosts.lpd or /etc/hosts.equiv. lpd is not enabled on FreeBSD by default.

tags | remote, overflow, arbitrary, local, root
systems | freebsd
SHA-256 | 840cb12218a791d933dd62c507535a88975344fe0b8c5ee583d5b7dd5bcfc089
Page 3 of 8
Back12345Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close