| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in FreeBSD up to 5.4. It has been rated as problematic. Affected by this vulnerability is the function i386_get_ldt. The manipulation leads to denial of service.
This vulnerability is listed as CVE-2005-1400. The attack must be carried out from within the local network. In addition, an exploit is available.
It is recommended to apply a patch to fix this issue.
Details
A vulnerability was found in FreeBSD up to 5.4 (Operating System) and classified as problematic. This issue affects the function i386_get_ldt. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values.
The bug was discovered 05/06/2005. The weakness was presented 05/06/2005 by Christian S.J. Peron (Website). It is possible to read the advisory at ftp.freebsd.org. The identification of this vulnerability is CVE-2005-1400 since 05/03/2005. The attack needs to approached within the local network. No form of authentication is needed for a successful exploitation. Technical details as well as a public exploit are known.
A public exploit has been developed in ANSI C and been published immediately after the advisory. The exploit is available at securityfocus.com. It is declared as functional. The vulnerability scanner Nessus provides a plugin with the ID 52666 (FreeBSD : avahi -- denial of service (8b986a05-4dbe-11e0-8b9a-02e0184b8d35)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks and running in the context l.
Upgrading to version 4-STABLE eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at ftp.FreeBSD.org. The best possible mitigation is suggested to be patching the affected component. A possible mitigation has been published 7 years after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (20429), Tenable (52666), SecurityFocus (BID 13527†), OSVDB (16092†) and Secunia (SA15261†). See VDB-1461 and VDB-1462 for similar entries. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
Version
License
Website
- Product: https://www.freebsd.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.3
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Access: Public
Status: Functional
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 52666
Nessus Name: FreeBSD : avahi -- denial of service (8b986a05-4dbe-11e0-8b9a-02e0184b8d35)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 52666
OpenVAS Name: FreeBSD Security Advisory (FreeBSD-SA-05:07.ldt.asc)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Exploit Delay Time: 🔍
Upgrade: FreeBSD 4-STABLE
Patch: ftp.FreeBSD.org
Timeline
05/03/2005 🔍05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/06/2005 🔍
05/30/2005 🔍
06/04/2006 🔍
03/13/2011 🔍
03/15/2011 🔍
03/11/2021 🔍
Sources
Product: freebsd.orgAdvisory: ftp.freebsd.org
Researcher: Christian S.J. Peron
Status: Confirmed
CVE: CVE-2005-1400 (🔍)
GCVE (CVE): GCVE-0-2005-1400
GCVE (VulDB): GCVE-100-1463
X-Force: 20429 - FreeBSD i386_get_ldt system call memory disclosure, Medium Risk
SecurityFocus: 13527 - FreeBSD i386_get_ldt(2) Local Kernel Memory Disclosure Vulnerability
Secunia: 15261 - FreeBSD "i386_get_ldt()" Kernel Memory Disclosure Vulnerability, Less Critical
OSVDB: 16092 - FreeBSD i386_get_ldt() Function Arbitrary Kernel Memory Disclosure
SecurityTracker: 1013905
Vulnerability Center: 11753 - FreeBSD i386_get_ldt System Call Allows Local Users Access to Sensitive Kernel Memory, Low
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 05/30/2005 11:14Updated: 03/11/2021 11:28
Changes: 05/30/2005 11:14 (98), 07/02/2019 21:12 (3), 03/11/2021 11:28 (3)
Complete: 🔍
Cache ID: 216:701:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.