Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-0708

Опубликовано: 02 мая 2005
Источник: debian
EPSS Низкий

Описание

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-8not-affectedpackage
kfreebsd-7not-affectedpackage

EPSS

Процентиль: 79%
0.01229
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

nvd
больше 20 лет назад

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

github
больше 3 лет назад

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

EPSS

Процентиль: 79%
0.01229
Низкий