First published: Sat Mar 05 2005(Updated: )
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =4.3-releng | |
Xinuos UnixWare | =7.1.3 | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =4.1.1-stable | |
FreeBSD FreeBSD | =4.6-releng | |
FreeBSD FreeBSD | =5.3-release | |
FreeBSD FreeBSD | =3.1 | |
Red Hat Enterprise Linux | =4.0 | |
Xinuos UnixWare | =7.1.4 | |
FreeBSD FreeBSD | =4.1.1-release | |
FreeBSD FreeBSD | =3.0-releng | |
FreeBSD FreeBSD | =2.2.5 | |
redhat enterprise Linux desktop | =3.0 | |
FreeBSD FreeBSD | =5.1-releng | |
Ubuntu | =4.1 | |
Red Hat Enterprise Linux | =4.0 | |
FreeBSD FreeBSD | =4.4-stable | |
FreeBSD FreeBSD | =5.3 | |
FreeBSD FreeBSD | =4.6-stable | |
Red Hat Enterprise Linux | =3.0 | |
FreeBSD FreeBSD | =4.8-release_p6 | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =4.6-release | |
FreeBSD FreeBSD | =5.1-release_p5 | |
FreeBSD FreeBSD | =4.3-stable | |
FreeBSD FreeBSD | =2.2.2 | |
FreeBSD FreeBSD | =4.7-stable | |
FreeBSD FreeBSD | =5.2.1-releng | |
FreeBSD FreeBSD | =5.0-release_p14 | |
FreeBSD FreeBSD | =3.5-stable | |
FreeBSD FreeBSD | =2.2.3 | |
FreeBSD FreeBSD | =5.1-release | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =4.3-release_p38 | |
FreeBSD FreeBSD | =2.0.5 | |
FreeBSD FreeBSD | =4.5-stable | |
FreeBSD FreeBSD | =4.6-release_p20 | |
FreeBSD FreeBSD | =4.5-release | |
FreeBSD FreeBSD | =5.0-releng | |
Ubuntu | =5.04 | |
FreeBSD FreeBSD | =1.1.5.1 | |
FreeBSD FreeBSD | =5.1-alpha | |
FreeBSD FreeBSD | =4.3-release | |
FreeBSD FreeBSD | =4.10-releng | |
FreeBSD FreeBSD | =4.7-releng | |
FreeBSD FreeBSD | =4.2-stable | |
FreeBSD FreeBSD | =4.5 | |
FreeBSD FreeBSD | =3.5.1 | |
FreeBSD FreeBSD | =4.4-release_p42 | |
FreeBSD FreeBSD | =4.7 | |
Ubuntu | =5.04 | |
Oracle Solaris SPARC | =9.0 | |
Xinuos OpenServer | =5.0.7 | |
Oracle Solaris SPARC | =10.0 | |
FreeBSD FreeBSD | =4.11-releng | |
FreeBSD FreeBSD | =4.1 | |
FreeBSD FreeBSD | =2.2.8 | |
FreeBSD FreeBSD | =3.5.1-stable | |
FreeBSD FreeBSD | =4.10-release | |
FreeBSD FreeBSD | =4.4-releng | |
FreeBSD FreeBSD | =4.4 | |
FreeBSD FreeBSD | =4.9-releng | |
FreeBSD FreeBSD | =5.1 | |
FreeBSD FreeBSD | =4.7-release_p17 | |
FreeBSD FreeBSD | =4.9-pre-release | |
FreeBSD FreeBSD | =2.1.6.1 | |
FreeBSD FreeBSD | =2.2 | |
Oracle Solaris SPARC | =7.0 | |
FreeBSD FreeBSD | =3.0 | |
FreeBSD FreeBSD | =4.8-pre-release | |
FreeBSD FreeBSD | =5.2 | |
FreeBSD FreeBSD | =3.2 | |
FreeBSD FreeBSD | =4.5-release_p32 | |
FreeBSD FreeBSD | =4.11-release_p3 | |
FreeBSD FreeBSD | =4.10-release_p8 | |
Red Hat Enterprise Linux | =4.0 | |
Xinuos UnixWare | =7.1.3_up | |
FreeBSD FreeBSD | =4.8 | |
FreeBSD FreeBSD | =4.2 | |
Red Hat Enterprise Linux | =3.0 | |
FreeBSD FreeBSD | =2.2.4 | |
FreeBSD FreeBSD | =2.1.0 | |
FreeBSD FreeBSD | =2.2.6 | |
FreeBSD FreeBSD | =2.1.6 | |
FreeBSD FreeBSD | =5.4-pre-release | |
FreeBSD FreeBSD | =2.1.7.1 | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =4.0-releng | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =4.1.1 | |
FreeBSD FreeBSD | =4.6 | |
FreeBSD FreeBSD | =4.3 | |
FreeBSD FreeBSD | =4.10 | |
FreeBSD FreeBSD | =5.4-release | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
FreeBSD FreeBSD | =5.0-alpha | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =4.5-releng | |
redhat enterprise Linux desktop | =4.0 | |
Ubuntu | =5.04 | |
FreeBSD FreeBSD | =5.2.1-release | |
FreeBSD FreeBSD | =4.8-releng | |
Red Hat Fedora Core | =core_3.0 | |
Ubuntu | =4.1 | |
FreeBSD FreeBSD | =5.0 | |
FreeBSD FreeBSD | =2.1.5 | |
FreeBSD FreeBSD | =3.5.1-release | |
Oracle Solaris SPARC | =9.0-x86_update_2 | |
FreeBSD FreeBSD | =5.3-stable | |
FreeBSD FreeBSD | =4.0-alpha | |
FreeBSD FreeBSD | =4.7-release | |
FreeBSD FreeBSD | =4.9 | |
FreeBSD FreeBSD | =4.6.2 | |
Oracle Solaris SPARC | =8.0 | |
FreeBSD FreeBSD | =2.0 | |
Red Hat Enterprise Linux | =2.1 | |
FreeBSD FreeBSD | =5.3-releng | |
FreeBSD FreeBSD | =4.11-stable | |
Red Hat Enterprise Linux | =3.0 | |
FreeBSD FreeBSD | =5.4-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0109 has a severity rating that indicates a vulnerability allowing local users to exploit hyper-threading to access sensitive information.
To mitigate CVE-2005-0109, it is recommended to disable hyper-threading in the BIOS settings or apply relevant patches provided by your operating system vendor.
CVE-2005-0109 affects various versions of FreeBSD and Red Hat Enterprise Linux among others.
CVE-2005-0109 allows attackers to create covert channels, monitor thread execution, and potentially obtain sensitive information like cryptographic keys.
CVE-2005-0109 is classified as a local vulnerability, requiring access to the affected system to exploit.