Vulnerability Description
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 4.1 |
References
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.ascPatchVendor Advisory
- http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html
- http://secunia.com/advisories/17368
- http://www.securityfocus.com/bid/13526
- http://www.securityfocus.com/bid/15252
- http://www.vupen.com/english/advisories/2005/2256
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.ascPatchVendor Advisory
- http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html
- http://secunia.com/advisories/17368
- http://www.securityfocus.com/bid/13526
- http://www.securityfocus.com/bid/15252
- http://www.vupen.com/english/advisories/2005/2256
FAQ
What is CVE-2005-1406?
CVE-2005-1406 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to...
How severe is CVE-2005-1406?
CVE-2005-1406 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-1406?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.