First published: Wed Jan 25 2006(Updated: )
A logic error in FreeBSD kernel 5.4-STABLE and 6.0 causes the kernel to calculate an incorrect buffer length, which causes more data to be copied to userland than intended, which could allow local users to read portions of kernel memory.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =5.4-stable | |
FreeBSD Kernel | =6.0-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0380 is classified as a high-severity vulnerability due to the potential for local users to read portions of kernel memory.
CVE-2006-0380 allows local users to exploit a logic error in the FreeBSD kernel, leading to unauthorized access to sensitive kernel memory.
CVE-2006-0380 affects FreeBSD versions 5.4-STABLE and 6.0-STABLE.
To mitigate CVE-2006-0380, users should upgrade to a patched version of FreeBSD that addresses the vulnerability.
CVE-2006-0380 is a local vulnerability, meaning it can only be exploited by users with local access to the system.