Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-1406

Опубликовано: 06 мая 2005
Источник: debian
EPSS Низкий

Описание

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd5-sourcefixed5.3-10package

EPSS

Процентиль: 26%
0.0009
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

nvd
почти 21 год назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

github
почти 4 года назад

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.

EPSS

Процентиль: 26%
0.0009
Низкий