Lucene search

K
freebsdFreeBSDDD48D9B9-5E7E-11E6-A6C3-14DAE9D210B8
HistoryAug 22, 2013 - 12:00 a.m.

FreeBSD -- Kernel memory disclosure in sctp(4)

2013-08-2200:00:00
vuxml.freebsd.org
9

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.003 Low

EPSS

Percentile

71.7%

Problem Description:
When initializing the SCTP state cookie being sent in INIT-ACK chunks,
a buffer allocated from the kernel stack is not completely initialized.
Impact:
Fragments of kernel memory may be included in SCTP packets and
transmitted over the network. For each SCTP session, there are two
separate instances in which a 4-byte fragment may be transmitted.
This memory might contain sensitive information, such as portions of the
file cache or terminal buffers. This information might be directly
useful, or it might be leveraged to obtain elevated privileges in
some way. For example, a terminal buffer might include a user-entered
password.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd-kernel= 9.1UNKNOWN
FreeBSDanynoarchfreebsd-kernel< 9.1_6UNKNOWN

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.003 Low

EPSS

Percentile

71.7%