search menu icon-carat-right cmu-wordmark

CERT Coordination Center

sendfile() system call may leak sections of kernel memory

Vulnerability Note VU#604846

Original Release Date: 2005-04-20 | Last Revised: 2006-01-10

Overview

The sendfile() system call does not handle specially crafted files properly. Exploitation of this vulnerability may leak sensitive information to a local attacker.

Description

The sendfile() system call is used to send a file through a socket without copying the file data into memory. A vulnerability exists in certain implementations of sendfile() that may allow an attacker to view sensitive kernel memory. If sendfile() is supplied a file that is then truncated during transmission, sendfile() may send sections of kernel memory through the socket. The contents of the leaked memory depends on what programs or files have recently been loaded and/or executed.

Impact

A local attacker may be able to view sections of kernel memory that contain sensitive information. For instance, it may be possible for an attacker can gain access to authentication information, such as passwords and usernames.

Solution

Check with Vendor


Users who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take. Please see the list of vendors we have notified below.

Vendor Information

604846
 

View all 40 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Marc Olzheim for reporting this vulnerability.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-0708
Severity Metric: 0.76
Date Public: 2005-04-20
Date First Published: 2005-04-20
Date Last Updated: 2006-01-10 21:14 UTC
Document Revision: 62

Sponsored by CISA.