Users login

Create an account »


Users login

Home » Security Advisories » FreeBSD

FreeBSD Security Advisories

Here you'll find the latest security advisories from FreeBSD. Our database currently contains 309 FreeBSD security advisories.
Page: 12... 6 7 8 9 10 11 12 13 out of 13

Unauthorized mail reading via comsat | SA-96:13 | June 05, 1996
The comsat daemon does not properly set privileges before attempting to read mail files for display on a user terminal.

Security compromise from man page utility | SA-96:11 | May 22, 1996
The man program is setuid to the "man" user. By executing a particular sequence of commands, an unprivileged local user may gain the access privileges of the "man" user. However, root ac

System stability compromise via mount_union program | FreeBSD-SA-96:10 | May 22, 1996
A bug was found in the union file system code which can allow an unprivileged local user to compromise system stability. This problem is present in all source code and binary distributions of Free

Unauthorized access via mount_union | FreeBSD-SA-96:09 | May 17, 1996
A bug was found in the vfsload(3) library call that affects all versions of FreeBSD from 2.0 through 2.2-CURRENT that caused a system vulnerability.

Apache httpd meta-character escaping | FreeBSD-SA-96:02 | April 22, 1996
A bug was found in the apache daemon that may allow remote users to obtain unauthorized access to a machine running apache httpd.

Syslog vulnerability | FreeBSD-SA-96:08 | April 21, 1996
A problem was found in the syslog(3) library call that affects FreeBSD 2.0 and FreeBSD 2.0.5 releases. This problem was fixed prior to the release of FreeBSD 2.1.

Sliplogin unauthorized access vulnerability | FreeBSD-SA-96:01 | April 21, 1996
A bug was found in the sliplogin program. The program did not properly restrict the environment used when invoking child processes. This problem is present in all source code and binary distributions

Sendmail pipe vuln | FreeBSD-SA-96:03 | April 20, 1996
Sendmail has the ability to deliver mail to a program on the local system via a pipe. This feature is often used to support automatic mail filtering and vacation programs. This provides a very fl

Unauthorized access via buffer overrun in talkd | SA-96:21 | January 18, 1996
This attack requires an intruder to be able to make a network connection to a vulnerable talkd program and provide corrupt DNS information to that host.

Page: 12... 6 7 8 9 10 11 12 13 out of 13

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »