Lucene search

K
f5F5F5:K5835
HistoryMar 28, 2013 - 12:00 a.m.

K5835 : Security Advisory: Possible kernel memory vulnerability in the sendfile() system call - CVE-2005-0708

2013-03-2800:00:00
my.f5.com
2

6.4 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.7%

Security Advisory Description

Note: Versions that are not listed in this Solution have not been evaluated for vulnerability to this security advisory. For information about F5 Networks’ security policy regarding evaluating older and unsupported versions of F5 Networks products, refer to K4602: Overview of F5 Networks security vulnerability response policy.

F5 Networks products and versions that have been evaluated for this Security Advisory

Product Affected Not Affected
BIG-IP LTM None 9.x
10.x
11.x
BIG-IP GTM None 9.x
10.x
11.x
BIG-IP ASM None 9.x
10.x
11.x
BIG-IP Link Controller None 9.x
10.x
11.x
BIG-IP WebAccelerator None 9.x
10.x
11.x
BIG-IP PSM None 9.x
10.x
11.x
BIG-IP WAN Optimization None 10.x
11.x
BIG-IP APM None 10.x
11.x
BIG-IP Edge Gateway None 10.x
11.x
BIG-IP Analytics None 11.x
BIG-IP AFM None 11.x
BIG-IP PEM
None 11.x
FirePass None 5.x
6.x
7.x
Enterprise Manager None 1.x
2.x
3.x
ARX None 2.x
3.x
4.x
5.x
6.x

Vulnerability description

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

Information about this advisory is available at the following location:

<https://vulners.com/cve/CVE-2005-0708&gt;

6.4 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.7%