Vulnerability Description
FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 8.4 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/62218
- http://www.debian.org/security/2014/dsa-3070
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.ascVendor Advisory
- http://www.securitytracker.com/id/1030539
- http://secunia.com/advisories/62218
- http://www.debian.org/security/2014/dsa-3070
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.ascVendor Advisory
- http://www.securitytracker.com/id/1030539
FAQ
What is CVE-2014-3953?
CVE-2014-3953 is a vulnerability with a CVSS score of 4.9 (MEDIUM). FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel me...
How severe is CVE-2014-3953?
CVE-2014-3953 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3953?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.