CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Netbsd : Security Vulnerabilities Published In 1999

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-0489 DoS 1999-09-05 2008-09-10
2.1
None Local Low Not required None None Partial
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
2 CVE-1999-1518 DoS Bypass 1999-07-15 2008-09-05
5.0
None Remote Low Not required None None Partial
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults.
3 CVE-1999-0764 1999-05-01 2008-09-09
6.4
None Remote Low Not required None Partial Partial
NetBSD allows ARP packets to overwrite static ARP entries.
4 CVE-1999-0763 1999-05-01 2008-09-09
6.4
None Remote Low Not required None Partial Partial
NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network.
5 CVE-1999-0674 1999-08-09 2008-09-09
7.2
Admin Local Low Not required Complete Complete Complete
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
6 CVE-1999-0466 1999-04-21 2008-09-09
7.2
Admin Local Low Not required Complete Complete Complete
The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device.
7 CVE-1999-0446 DoS 1999-04-12 2008-09-09
2.1
None Local Low Not required None None Partial
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
8 CVE-1999-0434 DoS +Priv 1999-03-30 2008-09-09
7.5
User Remote Low Not required Partial Partial Partial
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
9 CVE-1999-0433 DoS +Priv 1999-03-21 2008-09-09
4.6
User Local Low Not required Partial Partial Partial
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
10 CVE-1999-0422 1999-03-17 2008-09-09
4.6
User Local Low Not required Partial Partial Partial
In some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the "noexec" flag set.
11 CVE-1999-0420 +Priv 1999-03-17 2008-09-09
7.2
Admin Local Low Not required Complete Complete Complete
umapfs allows local users to gain root privileges by changing their uid through a malicious mount_umap program.
12 CVE-1999-0396 DoS 1999-02-17 2008-09-09
2.6
None Remote High Not required None None Partial
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.
13 CVE-1999-0367 1999-02-09 2008-09-09
2.1
None Local Low Not required Partial None None
NetBSD netstat command allows local users to access kernel memory.
Total number of vulnerabilities : 13   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.