Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-5666

Опубликовано: 23 сент. 2013
Источник: debian
EPSS Низкий

Описание

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-9fixed9.2~svn255465-1package
kfreebsd-9not-affectedwheezypackage

EPSS

Процентиль: 21%
0.00068
Низкий

Связанные уязвимости

nvd
больше 12 лет назад

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

github
больше 3 лет назад

The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.

EPSS

Процентиль: 21%
0.00068
Низкий