Lucene search

K
cve[email protected]CVE-2005-0708
HistoryMay 02, 2005 - 4:00 a.m.

CVE-2005-0708

2005-05-0204:00:00
web.nvd.nist.gov
25
freebsd
sendfile
system call
vulnerability
cve-2005-0708
nvd

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.7%

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

Affected configurations

NVD
Node
dragonflybsddragonflybsdMatch1.0
OR
dragonflybsddragonflybsdMatch1.1
OR
freebsdfreebsdMatch4.0
OR
freebsdfreebsdMatch4.0alpha
OR
freebsdfreebsdMatch4.0releng
OR
freebsdfreebsdMatch4.1
OR
freebsdfreebsdMatch4.1.1
OR
freebsdfreebsdMatch4.1.1release
OR
freebsdfreebsdMatch4.1.1stable
OR
freebsdfreebsdMatch4.2
OR
freebsdfreebsdMatch4.2stable
OR
freebsdfreebsdMatch4.3
OR
freebsdfreebsdMatch4.3release
OR
freebsdfreebsdMatch4.3release_p38
OR
freebsdfreebsdMatch4.3releng
OR
freebsdfreebsdMatch4.3stable
OR
freebsdfreebsdMatch4.4
OR
freebsdfreebsdMatch4.4release_p42
OR
freebsdfreebsdMatch4.4releng
OR
freebsdfreebsdMatch4.4stable
OR
freebsdfreebsdMatch4.5
OR
freebsdfreebsdMatch4.5release
OR
freebsdfreebsdMatch4.5release_p32
OR
freebsdfreebsdMatch4.5releng
OR
freebsdfreebsdMatch4.5stable
OR
freebsdfreebsdMatch4.6
OR
freebsdfreebsdMatch4.6release
OR
freebsdfreebsdMatch4.6release_p20
OR
freebsdfreebsdMatch4.6releng
OR
freebsdfreebsdMatch4.6stable
OR
freebsdfreebsdMatch4.6.2
OR
freebsdfreebsdMatch4.7
OR
freebsdfreebsdMatch4.7release
OR
freebsdfreebsdMatch4.7release_p17
OR
freebsdfreebsdMatch4.7releng
OR
freebsdfreebsdMatch4.7stable
OR
freebsdfreebsdMatch4.8
OR
freebsdfreebsdMatch4.8pre-release
OR
freebsdfreebsdMatch4.8release_p6
OR
freebsdfreebsdMatch4.8releng
OR
freebsdfreebsdMatch4.9
OR
freebsdfreebsdMatch4.9pre-release
OR
freebsdfreebsdMatch4.9releng
OR
freebsdfreebsdMatch4.10
OR
freebsdfreebsdMatch4.10release
OR
freebsdfreebsdMatch4.10releng
OR
freebsdfreebsdMatch4.11stable
OR
freebsdfreebsdMatch5.0
OR
freebsdfreebsdMatch5.0alpha
OR
freebsdfreebsdMatch5.0release_p14
OR
freebsdfreebsdMatch5.0releng
OR
freebsdfreebsdMatch5.1
OR
freebsdfreebsdMatch5.1alpha
OR
freebsdfreebsdMatch5.1release
OR
freebsdfreebsdMatch5.1release_p5
OR
freebsdfreebsdMatch5.1releng
OR
freebsdfreebsdMatch5.2
OR
freebsdfreebsdMatch5.2.1release
OR
freebsdfreebsdMatch5.2.1releng
OR
freebsdfreebsdMatch5.3
OR
freebsdfreebsdMatch5.3release
OR
freebsdfreebsdMatch5.3stable
OR
freebsdfreebsdMatch5.4pre-release

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.1 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.7%