CVE-2005-1406

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc - Patch, Vendor Advisory () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html - () http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html -
References () http://secunia.com/advisories/17368 - () http://secunia.com/advisories/17368 -
References () http://www.securityfocus.com/bid/13526 - () http://www.securityfocus.com/bid/13526 -
References () http://www.securityfocus.com/bid/15252 - () http://www.securityfocus.com/bid/15252 -
References () http://www.vupen.com/english/advisories/2005/2256 - () http://www.vupen.com/english/advisories/2005/2256 -

Information

Published : 2005-05-06 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1406

Mitre link : CVE-2005-1406

CVE.ORG link : CVE-2005-1406


JSON object : View

Products Affected

freebsd

  • freebsd