Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56201
Category:FreeBSD Local Security Checks
Title:FreeBSD Security Advisory (FreeBSD-SA-06:06.kmem.asc)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to the system
as announced in the referenced advisory FreeBSD-SA-06:06.kmem.asc

The network sub-system commonly utilizes the ioctl(2) mechanism to pass
information regarding the current state and statistics of logical and
physical network devices.

A buffer allocated from the kernel stack may not be completely
initialized before being copied to userland. [CVE-2006-0379]

A logic error in computing a buffer length may allow too much data to
be copied into userland. [CVE-2006-0380]

Solution:
Upgrade your system to the appropriate stable release
or security branch dated after the correction date

http://www.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-06:06.kmem.asc

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: BugTraq ID: 16373
Common Vulnerability Exposure (CVE) ID: CVE-2006-0379
http://www.securityfocus.com/bid/16373
FreeBSD Security Advisory: FreeBSD-SA-06:06
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:06.kmem.asc
http://www.osvdb.org/22730
http://securitytracker.com/id?1015541
http://secunia.com/advisories/18599
XForce ISS Database: bsd-buffer-initialization-disclosure(24338)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24338
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.