Users login

Create an account »


Users login

Home » Security Advisories

Security Advisories

Here you'll find the latest security advisories from various Vendors.
Page: 12... 896 897 898 899 900 901 902 903 out of 903

Orville-write port contains local root compromise | SA-00:10 | March 15, 2000
One of the commands installed by the port is incorrectly installed with setuid root permissions. The 'huh' command should not have any special privileges since it is intended to be run by the local u

mh/nmh/exmh/exmh2 ports allow remote execution of binary code | SA-00:07 | March 15, 2000
FreeBSD makes no claim about the security of these third-party applications, although an effort is underway to provide a security audit of the most security-critical ports.

Mtr port contains a local root exploit. | SA-00:09 | March 15, 2000
The mtr program (versions 0.41 and below) fails to correctly drop setuid root privileges during operation, allowing a local root compromise.

Htdig port allows remote reading of files | SA-00:06 | March 01, 2000
There is a security hole in the htsearch cgi-bin program for versions of htdig prior to 3.1.5, which allows remote users to read any file on the local system that is accessible to the user ID running

MySQL allows bypassing of password authentication | SA-00:05 | February 28, 2000
The MySQL database server (versions prior to 3.22.32) has a flaw in the password authentication mechanism which allows anyone who can connect to the server to access databases without requiring a pass

Delegate port contains numerous buffer overflows | SA-00:04 | February 19, 2000
Delegate is a versatile application-level proxy. Unfortunately it is written in a very insecure style, with potentially dozens of different exploitable buffer overflows (including several demonstrat

Asmon/Ascpu ports fail to drop privileges | SA-00:03 | February 19, 2000
Two optional third-party ports distributed with FreeBSD can be used to execute commands with elevated privileges, specifically setgid kmem privileges. This may lead to a local root compromise.

Old procfs hole incompletely filled | SA-00:02 | January 24, 2000
In January 1997 a fatal flaw in *BSD procfs code (leading to a local root compromise) was discussed on various security forums. The exploit code dealt with /proc/pid/mem interface. Since then *BSD ke

Insecure temporary file handling in make | SA-00:01 | January 19, 2000
The -j option to make(1) uses temporary files in /tmp to communicate with its child processes by storing the shell command the child should execute. This is useful on multi-processor architectures for

Remote amd attack | SA-99:06 | September 16, 1999
There are two buffer overflow vulnerabilities in the the amd daemon.

Fts library routine vulnerability | SA-99:05 | September 15, 1999
The fts library functions had a buffer overflow in them where which would lead to a core dump when periodic ran the security checking scripts (or other scripts which traverse trees that can be control

Coredumps and symbolic links | SA-99:04 | September 15, 1999
The fts library functions had a flaw in them where which would lead to a core dump when periodic ran the security checking scripts (or other scripts which traverse trees that can be controlled by user

Three ftp daemons in ports vulnerable to attack. | SA-99:03 | September 05, 1999
There are different security problems which can lead to remote root access in these ports or packages.

Profiling Across Exec Calls | SA-99:02 | September 04, 1999
A flaw exists in the implementation which allows an attacker to cause arbitrary locations in program executed by the attacker.

BSD File Flags and Programming Techniques | SA-99:01 | September 04, 1999
A user can set flags and mode on the device which they logged into. Since a bug in login and other similar programs causes the normal chown to fail, this first user will own the terminal of any login.

Net-tools buffer overruns | MDKSA-1999:001 | June 25, 1999
Upgrade to our new net-tools package which fixes potentional buffer overruns. This package also contains a patch for ESP and GRE protocols recognition in VPN masquerade.

IP fragmentation denial of service | SA-98:08 | November 04, 1998
There is a bug in the IP fragment reassembly code that might lead to a kernel panic. An attacker can create and send a pair of malformed IP packets which are then reassembled into an invalid UDP dat

TCP RST denial of sevice | SA-98:07 | June 13, 1998
A denial of service attack can be launched against FreeBSD systems running without one of the patches supplied later in this message.Using a flaw in the interpreation of sequence numbers in the RSTpac

Smurf attack | SA-98:06 | June 10, 1998
A solution at the intermediate network being abused to generate the ICMP echo replies is to either block ICMP echo requests directed to a broadcast address or to configure the hosts on that networ

Security compromise via mmap | SA-98:04 | June 02, 1998
It is possible for a process to open an append-only file according to the limitations of the flags, and then mmap the file shared with write permission even when the file is marked as append-only or i

System crash with NFS | SA-98:05 | June 02, 1998
When creating hard links on file systems, the kernel checks that both the original file and the link to it are located on the same file system. Unfortunately, there is an error in the NFS kern

Problems with TTCP | SA-98:03 | May 14, 1998
An accelerated open is initiated by a client by sending a new TCP option, called CC, to the server. The kernel keeps a special cache for each host it communicated with, among others containing th

Security compromise via mmap | SA-98:02 | March 12, 1998
Due to a 4.4BSD VM system problem, it is possible to memory-map a read-only descriptor to a character device in read-write mode.

Pentium processors have flaw allowing unpriviledged crashes | SA-97:06 | December 09, 1997
A specific sequence of instructions, starting with the byte codes F0 0F (hex) cause Pentium processors to lock up. This lockup wedges the entire system, requiring a hard reset to correct. Systems tha

LAND attack can cause harm to running FreeBSD systems | SA-98:01 | December 01, 1997
A problem exists in most FreeBSD derived stacks that allows a malicious user to send a packet that causes the sytsem to lock up, thus producing a denial of service attack.

Page: 12... 896 897 898 899 900 901 902 903 out of 903

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »