Vulnerability Description
The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a call to getlogin, which returns the entire buffer.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 8.4 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/61118
- http://secunia.com/advisories/62218
- http://www.debian.org/security/2014/dsa-3070Vendor Advisory
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc
- http://secunia.com/advisories/61118
- http://secunia.com/advisories/62218
- http://www.debian.org/security/2014/dsa-3070Vendor Advisory
- https://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A25.setlogin.asc
FAQ
What is CVE-2014-8476?
CVE-2014-8476 is a vulnerability with a CVSS score of 2.1 (LOW). The setlogin function in FreeBSD 8.4 through 10.1-RC4 does not initialize the buffer used to store the login name, which allows local users to obtain sensitive information from kernel memory via a cal...
How severe is CVE-2014-8476?
CVE-2014-8476 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-8476?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.