CVE-2005-1406
Published May 6, 2005
Last updated 14 years ago
Overview
- Description
- The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86C77AB-B8FF-4376-9B4E-C88417396F3D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "441BE3A0-20F4-4972-B279-19B3DB5FA14D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00EAEA17-033A-4A50-8E39-D61154876D2F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FFD9D1C-A459-47AD-BC62-15631417A32F" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "582B9BF3-5BF1-44A3-A580-62F2D44FDD34" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EE93350-92E6-4F5C-A14C-9993CFFDBCD4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD7C441E-444B-4DF5-8491-86805C70FB99" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A80E6A-6502-4A33-83BA-7DCC606D79AA" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD85B1ED-1473-4C22-9E1E-53F07CF517E9" } ], "operator": "OR" } ] } ]