CVE-2013-5666
FreeBSD Security Advisory - sendfile(2) Kernel Memory Disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.
La implementación de la llamada de sistema sendfile en el archivo sys/kern/uipc_syscalls.c en el kernel en FreeBSD versiones 9.2-RC1 y 9.2-RC2 no completa apropiadamente las transmisiones, lo que permite a los usuarios locales obtener información confidencial (memoria del kernel) mediante una longitud mayor que la longitud del archivo.
The sendfile(2) system call allows a server application (such as an HTTP or FTP server) to transmit the contents of a file over a network connection without first copying it to application memory. High performance servers such as Apache and ftpd use sendfile. On affected systems, if the length passed to sendfile(2) is non-zero and greater than the length of the file being transmitted, sendfile(2) will pad the transmission up to the requested length or the next pagesize boundary, whichever is smaller. The content of the additional bytes transmitted in this manner depends on the underlying filesystem, but may potentially include information useful to an attacker. An unprivileged user with the ability to run arbitrary code may be able to obtain arbitrary kernel memory contents.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-08-31 CVE Reserved
- 2013-09-10 CVE Published
- 2024-09-16 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://osvdb.org/97142 | Vdb Entry | |
http://svnweb.freebsd.org/base?view=revision&revision=255442 | X_refsource_confirm | |
http://www.securitytracker.com/id/1029013 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.freebsd.org/security/advisories/FreeBSD-SA-13%3a11.sendfile.asc | 2013-09-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 9.2 Search vendor "Freebsd" for product "Freebsd" and version "9.2" | rc1 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 9.2 Search vendor "Freebsd" for product "Freebsd" and version "9.2" | rc2 |
Affected
|