{"vuid":"VU#604846","idnumber":"604846","name":"sendfile() system call may leak sections of kernel memory","keywords":["Linux kernel","sendfile()","information disclosure"],"overview":"The sendfile() system call does not handle specially crafted files properly. Exploitation of this vulnerability may leak sensitive information to a local attacker.","clean_desc":"The sendfile() system call is used to send a file through a socket without copying the file data into memory. A vulnerability exists in certain implementations of sendfile() that may allow an attacker to view sensitive kernel memory. If  sendfile() is supplied a file that is then truncated during transmission, sendfile() may send sections of kernel memory through the socket. The contents of the leaked memory depends on what programs or files have recently been loaded and/or executed.","impact":"A local attacker may be able to view sections of kernel memory that contain sensitive information. For instance, it may be possible for an attacker can gain access to authentication information, such as passwords and usernames.","resolution":"Check with Vendor \nUsers who suspect they are vulnerable are encouraged to check with their vendor to determine the appropriate action to take. Please see the list of vendors we have notified below.","workarounds":"","sysaffected":"","thanks":"Thanks to Marc Olzheim for reporting this vulnerability.","author":"This document was written by Jeff Gennari.","public":["f","t","p",":","/","/","f","t","p",".","f","r","e","e","b","s","d",".","o","r","g","/","p","u","b","/","F","r","e","e","B","S","D","/","C","E","R","T","/","a","d","v","i","s","o","r","i","e","s","/","F","r","e","e","B","S","D","-","S","A","-","0","5",":","0","2",".","s","e","n","d","f","i","l","e",".","a","s","c"],"cveids":["CVE-2005-0708"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-03-07T21:13:31Z","publicdate":"2005-04-20T00:00:00Z","datefirstpublished":"2005-04-20T15:50:48Z","dateupdated":"2006-01-10T21:14:23Z","revision":62,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"17","cam_impact":"9","cam_easeofexploitation":"7","cam_attackeraccessrequired":"2","cam_scorecurrent":"0.7630875","cam_scorecurrentwidelyknown":"0.9639","cam_scorecurrentwidelyknownexploited":"1.76715","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.7630875,"vulnote":null}