Secunia Security Advisory - NetBSD has acknowledged a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
82aa7461866bcc22269835cd41299260218222bdef69785794f9410b296aad19
Secunia Security Advisory - Maksymilian Arciemowicz has reported a vulnerability in NetBSD ftpd, which can be exploited by malicious people to conduct cross-site request forgery attacks.
1d5386677d56955d19c04125ee5c3db16a37d2b04ef220b7ec016287e5c2e853
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).
875ff4f509d708b6f32d991ae649184d574e4703e05dcc821d7d04ce0bf7c6e7
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).
cc892fc680fb2412dc444a2bb2bc49a61f0f02d7b4ae9694392612cf6266e905
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
dd86708373beec55143f2114a2f230cd2a756b735328e260017512822b59ff0e
Secunia Security Advisory - NetBSD has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.
fa0bb4b90f7bb1324e0bfc3044d2d66344f4d1fa5a4162b007340ff63a7a4e7b
Secunia Security Advisory - NetBSD has issued an update for OpenSSL. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
9e644bb242fba4672d7294ce9b398a596d0bc087896f2c595a5ce9ba806c89ba
Secunia Security Advisory - NetBSD has issued an update for OpenSSH. This fixes a weakness and a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions and to disclose sensitive information.
452ef225e5d6f96d8fab013d405234db79e8cf3943787616a0a34870c63f7abd
Secunia Security Advisory - NetBSD has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
20e2230bb6001cf43ac675a30fb25b2904fca6e362344cc49b985f84271ba376
FreeBSD and NetBSD suffer from multiple vulnerabilities in libc in the strfmon() function.
cbe3c1735c6036b3a1b56bde659692782a69127f4311229609029b7922bf0442
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which potentially can be exploited by malicious people to compromise a vulnerable system.
955d76152e069896ade5179a04ecac4ad0cc4044387d1944361c2d0e9c38d342
Secunia Security Advisory - A security issue has been reported in NetBSD, which can potentially be exploited by malicious people to bypass certain security restrictions.
ad11633ed4b05ffd2009727461336e52995daea342b8d2879510edd49bd3329d
The paper describes a weakness in the pseudo random number generator (PRNG) in use by OpenBSD, Mac OS X, Mac OS X Server, Darwin, NetBSD, FreeBSD and DragonFlyBSD to produce random DNS transaction IDs (OpenBSD) and random IP fragmentation IDs.
f4d5a9167d760de1ba2fee62eca09913ff2bc2b3ccd64974ce7df7c989bc49c5
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious people to cause a DoS (Denial of Service).
9c4e9af6188293fc22efe60fe17d47ec1b8e2de2160a6db76ed4c4da41dbfb2b
Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.
b4b3d3540a7022aa7a81cae93f28c8475bc2660a21f88126725624c09769f1fb
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
a46610fc761e61f4f85750693f6e17aafa3a47e24e8cef76401f67d25e94d186
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.
32e1f026dd57ab647074756629038bd5a27a8e6656915da975aca3b0f3a7ca75
The NetBSD ftpd and the tnftpd port suffer from a remote stack overrun, which can lead to a root compromise. The bug is in glob.c file.
6f91ab16ee6d396173a45820d89bcfd6ed6fcfb8449312205c4ce215b6caec78
A lack of environment sanitization in FreeBSD, OpenBSD, and NetBSD dynamic loaders may allow for privilege escalation.
10d249a491bc27ea8ab76d147121933d548a8fe892768f2d033e4b40d075076c
The Firewire device enabled by default in the GENERIC kernel for NetBSD defines an IOCTL function which can be malicious called passing a negative buffer length value. This value will bypass the length check (because the value is negative) and will be used in a copyout operation. This is a kernel bug and the system can be compromised by local users and important system information can be disclosed.
13c192bac8d2f8ab8a9022715e1340029f8bed9822169e74a3ea56a0de711ecb
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
64d21cef13574338f49015127d369e1f02515fe4eb81cbda716d885ff4cd1278
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.
831a4b6a39b33de014871382233112437df138ac0b88113a1f9b944299087f23
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris.
6c4d8745f04e59f2ba68d56fd1554551592f08a0497c9fc21b84498f47d1aee0
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.
174a1756727e8a70ce5608c6f412ecc89544c67b602215c1252df8e4a3c34d10
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris.
179d6ee928d353a18a1720cbccd146154d2f0e94f9ec017db838f45c1e8ddcc9