First published: Wed Dec 31 2003(Updated: )
The iBCS2 system call translator for statfs in NetBSD 1.5 through 1.5.3 and FreeBSD 4 up to 4.8-RELEASE-p2 and 5 up to 5.1-RELEASE-p1 allows local users to read portions of kernel memory (memory disclosure) via a large length parameter, which copies additional kernel memory into userland memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =1.5.3 | |
NetBSD current | =1.5 | |
FreeBSD Kernel | <=5.1 | |
NetBSD current | =1.5.1 | |
NetBSD current | =1.5.2 | |
FreeBSD Kernel | <=4.8 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | <=4.8 | |
FreeBSD Kernel | <=5.1 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =5.0 | |
NetBSD current | =1.5 | |
NetBSD current | =1.5.1 | |
NetBSD current | =1.5.2 | |
NetBSD current | =1.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1289 has a medium severity rating due to its potential for memory disclosure.
To fix CVE-2003-1289, upgrade to a patched version of NetBSD or FreeBSD that addresses this vulnerability.
CVE-2003-1289 affects NetBSD versions 1.5 through 1.5.3 and FreeBSD versions 4 up to 4.8-RELEASE-p2 and 5 up to 5.1-RELEASE-p1.
CVE-2003-1289 is a memory disclosure vulnerability that allows local users to read kernel memory.
Mitigation for CVE-2003-1289 is limited; upgrading to a secure version is the most effective solution.