First published: Fri May 06 2005(Updated: )
The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =4.11 | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1406 is considered a medium severity vulnerability due to the risk of sensitive memory data exposure.
To fix CVE-2005-1406, upgrade your FreeBSD system to a patched version that resolves this issue.
CVE-2005-1406 affects FreeBSD versions 4.x from 4.1 to 4.11 and 5.x from 5.1 to 5.4.
CVE-2005-1406 allows applications to potentially read previously used sensitive information from memory.
Yes, CVE-2005-1406 specifically affects the FreeBSD operating system.