CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. | 7.1 |
|||
Buffer overflow in Unix-to-Unix Copy Protocol (UUCP) in BSDI BSD/OS 3.0 through 4.2 allows local users to execute arbitrary code via a long command line argument. | 7.2 |
|||
Vulnerability in a system call in BSDI 3.0 and 3.1 allows local users to cause a denial of service (reboot) in the kernel via a particular sequence of instructions. | 2.1 |
|||
rcvtty in BSD 3.0 and 4.0 does not properly drop privileges before executing a script, which allows local attackers to gain privileges by specifying an alternate Trojan horse script on the command line. | 7.2 |
|||
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. | 5 |
|||
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd). | 5.1 |
|||
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. | 1.9 |
|||
NFS cache poisoning. | 10 |
|||
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type. | 10 |
|||
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. | 9.3 |
|||
Local user gains root privileges via buffer overflow in rdist, via lookup() function. | 7.2 |
|||
Sendmail decode alias can be used to overwrite sensitive files. | 5 |
|||
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections. | 5 |