First published: Sun Dec 05 2004(Updated: )
The cmdline pseudofiles in (1) procfs on FreeBSD 4.8 through 5.3, and (2) linprocfs on FreeBSD 5.x through 5.3, do not properly validate a process argument vector, which allows local users to cause a denial of service (panic) or read portions of kernel memory. NOTE: this candidate might be SPLIT into 2 separate items in the future.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.8-releng | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =4.10-release | |
FreeBSD Kernel | =4.10-releng | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.2.1-release | |
FreeBSD Kernel | =5.2.1-releng | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.3-release | |
FreeBSD Kernel | =5.3-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1066 is considered a denial of service vulnerability that can also expose kernel memory.
To mitigate CVE-2004-1066, it is recommended to upgrade to a patched version of FreeBSD that addresses this vulnerability.
CVE-2004-1066 affects FreeBSD versions 4.0 to 5.3, including specific releases like 4.1.1, 4.10, and 5.3-release.
CVE-2004-1066 is a local vulnerability, meaning it requires local user access to exploit.
The potential impacts of CVE-2004-1066 include denial of service, system crashes, and unauthorized access to sensitive kernel memory.