Логотип exploitDog
bind:CVE-2014-3953
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-3953

Количество 3

Количество 3

nvd логотип

CVE-2014-3953

больше 11 лет назад

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2014-3953

больше 11 лет назад

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 befor ...

CVSS2: 4.9
EPSS: Низкий
github логотип

GHSA-694p-625j-cg96

больше 3 лет назад

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2014-3953

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.

CVSS2: 4.9
0%
Низкий
больше 11 лет назад
debian логотип
CVE-2014-3953

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 befor ...

CVSS2: 4.9
0%
Низкий
больше 11 лет назад
github логотип
GHSA-694p-625j-cg96

FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу