Description
The SIOCGIFCONF ioctl (ifconf function) in FreeBSD 4.x through 4.11 and 5.x through 5.4 does not properly clear a buffer before using it, which allows local users to obtain portions of sensitive kernel memory.
Product(s):
- FreeBSD 4.0
- FreeBSD 4.0 Alpha
- FreeBSD 4.0 Releng
- FreeBSD 4.1.1
- FreeBSD 4.1.1 Release
- FreeBSD 4.1.1 Stable
- FreeBSD 4.10
- FreeBSD 4.10 Patch 10
- FreeBSD 4.10 Patch 11
- FreeBSD 4.10 Patch 13
- FreeBSD 4.10 Patch 14
- FreeBSD 4.10 Patch 15
- FreeBSD 4.10 Patch 16
- FreeBSD 4.10 Patch 18
- FreeBSD 4.10 Patch 19
- FreeBSD 4.10 Patch 20
- FreeBSD 4.10 Patch 21
- FreeBSD 4.10 Patch 22
- FreeBSD 4.10 Patch 23
- FreeBSD 4.10 Patch 24
- FreeBSD 4.10 Patch 2
- FreeBSD 4.10 Patch 3
- FreeBSD 4.10 Patch 4
- FreeBSD 4.10 Patch 5
- FreeBSD 4.10 Patch 7
- FreeBSD 4.10 Patch 8
- FreeBSD 4.10 Patch 9
- FreeBSD 4.10 Release Candidate
- FreeBSD 4.10 Release
- FreeBSD 4.10 Releng
- FreeBSD 4.11 Stable
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.2 Stable
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.3 Release
- FreeBSD 4.3 Release P38
- FreeBSD 4.3 Releng
- FreeBSD 4.3 Stable
- FreeBSD 4.4
- FreeBSD 4.4 Patch 27
- FreeBSD 4.4 Patch 41
- FreeBSD 4.4 Patch 42
- FreeBSD 4.4 Patch 44
- FreeBSD 4.4 Patch 45
- FreeBSD 4.4 Patch 46
- FreeBSD 4.4 Patch 47
- FreeBSD 4.4 Patch 4
- FreeBSD 4.4 Patch 8
- FreeBSD 4.4 Release P42
- FreeBSD 4.4 Releng
- FreeBSD 4.4 Stable
- FreeBSD 4.5
- FreeBSD 4.5 Patch 1
- FreeBSD 4.5 Patch 20
- FreeBSD 4.5 Patch 31
- FreeBSD 4.5 Patch 32
- FreeBSD 4.5 Patch 34
- FreeBSD 4.5 Patch 35
- FreeBSD 4.5 Patch 36
- FreeBSD 4.5 Patch 37
- FreeBSD 4.5 Release
- FreeBSD 4.5 Release P32
- FreeBSD 4.5 Releng
- FreeBSD 4.5 Stable
- FreeBSD 4.6.2
- FreeBSD 4.6.2 Patch 22
- FreeBSD 4.6.2 Patch 26
- FreeBSD 4.6.2 Patch 27
- FreeBSD 4.6.2 Patch 2
- FreeBSD 4.6.2 Patch 8
- FreeBSD 4.6.2 Patch 9
- FreeBSD 4.6
- FreeBSD 4.6 Patch 11
- FreeBSD 4.6 Patch 12
- FreeBSD 4.6 Patch 16
- FreeBSD 4.6 Patch 19
- FreeBSD 4.6 Patch 20
- FreeBSD 4.6 Patch 23
- FreeBSD 4.6 Patch 24
- FreeBSD 4.6 Patch 25
- FreeBSD 4.6 Patch 7
- FreeBSD 4.6 Release
- FreeBSD 4.6 Release p20
- FreeBSD 4.6 Releng
- FreeBSD 4.6 Stable
- FreeBSD 4.7
- +156 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-1126, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-1126 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.