[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2004-0482Date: (C)2004-07-07   (M)2024-02-22


Multiple integer overflows in (1) procfs_cmdline.c, (2) procfs_fpregs.c, (3) procfs_linux.c, (4) procfs_regs.c, (5) procfs_status.c, and (6) procfs_subr.c in procfs for OpenBSD 3.5 and earlier allow local users to read sensitive kernel memory and possibly perform other unauthorized activities.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-11605
http://www.openbsd.org/errata34.html
http://www.openbsd.org/errata35.html
http://marc.info/?l=full-disclosure&m=108481812926420&w=2
OSVDB-6114
http://marc.info/?l=openbsd-security-announce&m=108445767103004&w=2
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/020_procfs.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/006_procfs.patch
http://www.deprotect.com/advisories/DEPROTECT-20041305.txt
openbsd-procfs-gain-privileges(16226)

© SecPod Technologies