Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-1935

Опубликовано: 18 июн. 2009
Источник: debian
EPSS Низкий

Описание

Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address lookups and read sensitive information in memory pages via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-6removedpackage
kfreebsd-6no-dsalennypackage
kfreebsd-7fixed7.2-2package
kfreebsd-7no-dsalennypackage

EPSS

Процентиль: 21%
0.0007
Низкий

Связанные уязвимости

nvd
больше 16 лет назад

Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address lookups and read sensitive information in memory pages via unspecified vectors.

github
почти 4 года назад

Integer overflow in the pipe_build_write_buffer function (sys/kern/sys_pipe.c) in the direct write optimization feature in the pipe implementation in FreeBSD 7.1 through 7.2 and 6.3 through 6.4 allows local users to bypass virtual-to-physical address lookups and read sensitive information in memory pages via unspecified vectors.

EPSS

Процентиль: 21%
0.0007
Низкий