Users login

Create an account »


Users login

Home » Security Advisories » FreeBSD

FreeBSD Security Advisories

Here you'll find the latest security advisories from FreeBSD. Our database currently contains 309 FreeBSD security advisories.
Page: 12...4 5 6 7 8 out of 13

Pw(8) race condition master.passwd disclosure | SA-02:02 | January 04, 2002
During the modification, a temporary copy of the file is created. However, this temporary file is mistakenly created with permissions that allow it to be read by any user.

Pkg_add directory permission vulnerability | SA-02:01 | January 04, 2002
The temporary directory used in the extraction was created with world-searchable permissions, allowing arbitrary users to examine the contents of the package as it was being extracted. This might allo

Wu-ftpd port remote root compromise | SA-01:64 | December 04, 2001
The wu-ftpd port, versions prior to wu-ftpd-2.6.1_7, contains a vulnerability which allows FTP users, both anonymous FTP users and those with valid accounts, to execute arbitrary code as root on the

OpenSSH UseLogin directive privilege escalation | SA-01:63 | December 02, 2001
However, when the OpenSSH server `sshd' is configured to use the system's login program (via the directive `UseLogin yes' in sshd_config), this environment is passed to login, which is invoked with

UUCP local root exploit | SA-01:62 | October 08, 2001
The UUCP suite of utilities allow a user-specified configuration file to be given on the command-line. This configuration file is incorrectly processed by the setuid uucp and/or setgid dialer UUCP u

Squid accelerator-only mode ACLs ignore | SA-01:61 | October 08, 2001
If squid is configured in acceleration-only mode (http_accel_host is set, but http_accel_with_proxy is off), then as a result of a bug, access control lists (ACLs) are ignored.

Procmail signal handling error | SA-01:60 | September 24, 2001
If a signal is delivered while procmail is already in an unsafe signal handler, undefined behaviour may result, possibly leading to the ability to perform actions as the superuser under unprivileged l

Rmuser race condition | SA-01:59 | September 04, 2001
When removing a user from the system with the rmuser utility, the /etc/master.passwd file and it's corresponding database /etc/spwd.db must be updated. The rmuser script was incorrectly doing this b

Lpd remote root vulnerability | SA-01:58 | August 30, 2001
Users on the local machine or on remote systems which are allowed to access the local line printer daemon may be able to cause a buffer overflow.

Sendmail local root vulnerability | SA-01:57 | August 27, 2001
Sendmail contains an input validation error which may lead to the execution of arbitrary code with elevated privileges by local users.

Tcp_wrappers hostname checking flaw | SA-01:56 | August 23, 2001
The addition of a flawed check for a numeric result during reverse DNS lookup causes tcp_wrappers to skip some of its sanity checking of DNS results.

Procfs process memory vulnerability | SA-01:55 | August 21, 2001
The procfs code checks for gid kmem privilege when granting access to the /proc//mem file, however, the code which is used to allow read-only access via the kmem group was incorrect, and inappropriate

Telnetd buffer overflow | SA-01:54 | August 20, 2001
Due to incorrect bounds checking of data buffered for output to the remote client, an attacker can cause the telnetd process to overflow the buffer and crash, or execute arbitrary code as the user ru

Ipfw `me' on P2P flaw | SA-01:53 | August 17, 2001
A flaw in the implementation of the ipfw `me' rules when used in conjunction with point-to-point interfaces results in filter rules which match the remote IP address of the point-to-point interface

IPv4 packets denial of service | SA-01:52 | August 06, 2001
Remote users may be able to prevent a FreeBSD system from communicating with other systems on the network by transmitting large numbers of fragmented IPv4 datagrams.

OpenSSL PRNG flaw | SA-01:51 | July 30, 2001
A flaw in PRNG of OpenSSL versions previous to 0.9.6b allows an attacker to determine the PRNG state and future output under certain restricted conditions, thereby weakening the strength of the PRNG a

Windowmaker arbitrary code execution | SA-01:50 | July 27, 2001
The windowmaker ports, versions prior to windowmaker-0.65.0_2 and windowmaker-i18n-0.65.0_1, contain a potentially exploitable buffer overflow when displaying a very long window title in the window li

Telnetd incorrect bounds checking multiple vulnerabilities | SA-01:49 | July 23, 2001
Due to incorrect bounds checking of data buffered for output to the remote client, an attacker can cause the telnetd process to overflow the buffer and crash, or execute arbitrary code as the user run

Tcpdump incorrect string handling overrflow | SA-01:48 | July 17, 2001
Due to incorrect string length handling in the decoding of AFS RPC packets, a remote user may be able to overflow a buffer causing the local tcpdump process to crash.

Xinetd logging buffer overflow vulnerability | SA-01:47 | July 10, 2001
If xinetd is configured to log the userid of remote clients obtained via the RFC1413 ident service, a remote user may be able to cause xinetd to crash by returning a specially-crafted ident response.

W3m MIME headers parsing buffer overflow | SA-01:46 | July 10, 2001
A malicious server which is visited by a user with the w3m browser can exploit the browser security holes in order to execute arbitrary code on the local machine as the local user.

Samba ports NetBIOS name validation problem | SA-01:45 | July 10, 2001
The samba ports, versions prior to samba-2.0.10, samba-devel-2.2.0a, and ja-samba-2.0.9.j1.0_1, fail to properly validate NetBIOS names.

Gnupg format string vulnerability | SA-01:44 | July 10, 2001
If gnupg attempts to decrypt a file whose filename does not end in '.gpg', the filename is copied to the prompt string, allowing a user-supplied format string. This may allow a malicious user to cause

Fetchmail headers rewriting buffer overflow | SA-01:43 | July 10, 2001
The fetchmail port, versions prior to fetchmail-5.8.6, contains a potentially exploitable buffer overflow when rewriting headers longer than 512 bytes. This problem may allow remote users to cause fe

Exec signal handling root compromise | SA-01:42 | July 10, 2001
A flaw exists in FreeBSD signal handler clearing that would allow for some signal handlers to remain in effect after the exec. Most of the signals were cleared, but some signal hanlders were not. T

Page: 12...4 5 6 7 8 out of 13

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »