First published: Tue Apr 05 2005(Updated: )
The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.3-releng | |
FreeBSD Kernel | =4.1.1-stable | |
FreeBSD Kernel | =4.6-releng | |
FreeBSD Kernel | =5.3-release | |
FreeBSD Kernel | =4.1.1-release | |
FreeBSD Kernel | =5.1-releng | |
FreeBSD Kernel | =4.4-stable | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =4.6-stable | |
FreeBSD Kernel | =4.8-release_p6 | |
FreeBSD Kernel | =4.6-release | |
FreeBSD Kernel | =5.1-release_p5 | |
FreeBSD Kernel | =4.3-stable | |
FreeBSD Kernel | =4.7-stable | |
FreeBSD Kernel | =5.2.1-releng | |
FreeBSD Kernel | =5.0-release_p14 | |
FreeBSD Kernel | =5.1-release | |
FreeBSD Kernel | =4.3-release_p38 | |
FreeBSD Kernel | =4.5-stable | |
FreeBSD Kernel | =4.6-release_p20 | |
FreeBSD Kernel | =4.5-release | |
FreeBSD Kernel | =5.0-releng | |
FreeBSD Kernel | =5.1-alpha | |
FreeBSD Kernel | =4.3-release | |
FreeBSD Kernel | =4.10-releng | |
FreeBSD Kernel | =4.7-releng | |
FreeBSD Kernel | =4.2-stable | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.4-release_p42 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.1 | |
DragonFlyBSD | =1.0 | |
FreeBSD Kernel | =4.10-release | |
FreeBSD Kernel | =4.4-releng | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.9-releng | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =4.7-release_p17 | |
FreeBSD Kernel | =4.9-pre-release | |
FreeBSD Kernel | =4.8-pre-release | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =4.5-release_p32 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =5.4-pre-release | |
FreeBSD Kernel | =4.0-releng | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =5.0-alpha | |
FreeBSD Kernel | =4.5-releng | |
DragonFlyBSD | =1.1 | |
FreeBSD Kernel | =5.2.1-release | |
FreeBSD Kernel | =4.8-releng | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =5.3-stable | |
FreeBSD Kernel | =4.0-alpha | |
FreeBSD Kernel | =4.7-release | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.6.2 | |
FreeBSD Kernel | =4.11-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0708 is classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2005-0708, users should upgrade to a patched version of FreeBSD beyond 5.4 or implement workarounds that prevent the usage of the sendfile system call.
CVE-2005-0708 exploits the sendfile system call by allowing remote attackers to access portions of kernel memory when a file is truncated during transmission.
CVE-2005-0708 affects FreeBSD versions from 4.8 to 5.4, including various releases and updates within those ranges.
Yes, CVE-2005-0708 can lead to data leakage as it may allow attackers to obtain sensitive information residing in kernel memory.