Freebsd : Security Vulnerabilities, CVEs, Published In 2001 (Denial of service) CVSS score >= 3
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Max CVSS
5.0
EPSS Score
1.18%
Published
2001-07-07
Updated
2018-10-30
SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay.
Max CVSS
5.0
EPSS Score
0.94%
Published
2001-12-06
Updated
2017-10-10
NetBSD 1.5 and earlier and FreeBSD 4.3 and earlier allows a remote attacker to cause a denial of service by sending a large number of IP fragments to the machine, exhausting the mbuf pool.
Max CVSS
5.0
EPSS Score
1.41%
Published
2001-09-20
Updated
2017-10-10
rwho daemon rwhod in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service via malformed packets with a short length.
Max CVSS
5.0
EPSS Score
0.67%
Published
2001-06-27
Updated
2017-10-10
time server daemon timed allows remote attackers to cause a denial of service via malformed packets.
Max CVSS
10.0
EPSS Score
0.72%
Published
2001-06-27
Updated
2017-10-10
telnetd in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file.
Max CVSS
5.0
EPSS Score
0.84%
Published
2001-01-09
Updated
2017-10-10
6 vulnerabilities found