Vulnerabilities > CVE-2005-0708

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The sendfile system call in FreeBSD 4.8 through 4.11 and 5 through 5.4 can transfer portions of kernel memory if a file is truncated while it is being sent, which could allow remote attackers to obtain sensitive information.

Nessus

NASL familyFreeBSD Local Security Checks
NASL idFREEBSD_SENDFILE_DOS.NASL
descriptionThe remote host is running a version of FreeBSD which contains a flaw in the sendfile() API. There is an error in the sendfile() API which may allow a local user to disclose parts of the contents of the kernel memory.
last seen2020-06-01
modified2020-06-02
plugin id17984
published2005-04-06
reporterThis script is Copyright (C) 2005-2010 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17984
titleFreeBSD : SA-05:02.sendfile
code
#
# (C) Tenable Network Security, Inc.
#

if ( ! defined_func("bn_random") ) exit(0);

include("compat.inc");

if(description)
{
 script_id(17984);
 script_version ("$Revision: 1.9 $");
 script_bugtraq_id(12993);
 script_cve_id("CVE-2005-0708");
 name["english"] = "FreeBSD : SA-05:02.sendfile";
 
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch" );
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of FreeBSD which contains a flaw in the 
sendfile() API.

There is an error in the sendfile() API which may allow a local user to disclose
parts of the contents of the kernel memory." );
 script_set_attribute(attribute:"solution", value:
"http://www.securityfocus.com/advisories/8356" );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");



 script_set_attribute(attribute:"plugin_publication_date", value: "2005/04/06");
 script_cvs_date("$Date: 2010/10/06 01:50:04 $");
 script_end_attributes();

 
 summary["english"] = "Check for the version of the FreeBSD";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2005-2010 Tenable Network Security, Inc.");
 family["english"] = "FreeBSD Local Security Checks";
 script_family(english:family["english"]);
 
 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/FreeBSD/pkg_info");
 exit(0);
}



include("freebsd_package.inc");


package = get_kb_item("Host/FreeBSD/release");

if ( ! package ) exit(0);


if ( egrep(pattern:"FreeBSD-5\.", string:package) )
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-5.3_7") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}

if ( egrep(pattern:"FreeBSD-4\.[0-7][^0-9]", string:package) )
{
 security_hole(0);
 exit(0);
}

if ( egrep(pattern:"FreeBSD-4\.8[^0-9]", string:package) ) 
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.8_29") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}


if ( egrep(pattern:"FreeBSD-4\.(9|10)", string:package) ) 
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.10_7") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}


if ( egrep(pattern:"FreeBSD-4\.11", string:package) ) 
{
 if ( pkg_cmp(pkg:package, reference:"FreeBSD-4.11_2") < 0 )
 {
  security_hole(0);
  exit(0);
 }
}