The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc - Patch, Vendor Advisory | |
References | () http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html - | |
References | () http://secunia.com/advisories/17368 - | |
References | () http://www.securityfocus.com/bid/13526 - | |
References | () http://www.securityfocus.com/bid/15252 - | |
References | () http://www.vupen.com/english/advisories/2005/2256 - |
Information
Published : 2005-05-06 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1406
Mitre link : CVE-2005-1406
CVE.ORG link : CVE-2005-1406
JSON object : View
Products Affected
freebsd
- freebsd
CWE