Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-1406

Опубликовано: 06 мая 2005
Источник: debian
EPSS Низкий

Описание

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd5-sourcefixed5.3-10package

EPSS

Процентиль: 26%
0.0009
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

nvd
больше 20 лет назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

github
больше 3 лет назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

EPSS

Процентиль: 26%
0.0009
Низкий