ID OSVDB:20730 Type osvdb Reporter OSVDB Modified 2005-10-31T00:00:00
Description
Vulnerability Description
NetBSD contains a flaw related to the process file system (procfs) that may allow a malicious user to cause a negative uio_offset. No further details have been provided.
Technical Description
While specific details regarding this vulnerability were not provided by the vendor, a negative offset should not be permitted when using the process file system (procfs).
If a malicious user causes a negative offset when reading from a procfs file, a system crash and/or kernel memory disclosure will result. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.
Solution Description
Upgrade to version 2.0.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Short Description
NetBSD contains a flaw related to the process file system (procfs) that may allow a malicious user to cause a negative uio_offset. No further details have been provided.
{"type": "osvdb", "published": "2005-10-31T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:20730", "hashmap": [{"key": "affectedSoftware", "hash": "13dfb4ccb006bf93a950bc69776e0231"}, {"key": "bulletinFamily", "hash": "f9fa10ba956cacf91d7878861139efb9"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "description", "hash": "98584638b23014fdb9905e87cbcaabe3"}, {"key": "href", "hash": "9f30ee2c24c2a3c8c6cd6a28588117ff"}, {"key": "modified", "hash": "92be042af7b5eea3456b7cd747e832ea"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "92be042af7b5eea3456b7cd747e832ea"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "955b328dc7cd615c13af5464c9183464"}, {"key": "title", "hash": "8472196786fe697f3394c2212a0636ae"}, {"key": "type", "hash": "1327ac71f7914948578f08c54f772b10"}], "bulletinFamily": "software", "cvss": {"vector": "NONE", "score": 0.0}, "viewCount": 0, "history": [], "edition": 1, "objectVersion": "1.2", "reporter": "OSVDB", "title": "NetBSD procfs Negative uio_offset Unspecified Issue", "affectedSoftware": [{"operator": "eq", "version": "1.4.x", "name": "NetBSD"}, {"operator": "eq", "version": "1.4", "name": "NetBSD"}, {"operator": "eq", "version": "1.5", "name": "NetBSD"}, {"operator": "eq", "version": "1.3.x", "name": "NetBSD"}, {"operator": "eq", "version": "0.9", "name": "NetBSD"}, {"operator": "eq", "version": "1.5.x", "name": "NetBSD"}, {"operator": "eq", "version": "1.2", "name": "NetBSD"}, {"operator": "eq", "version": "1.2.x", "name": "NetBSD"}, {"operator": "eq", "version": "1.0", "name": "NetBSD"}, {"operator": "eq", "version": "1.1", "name": "NetBSD"}, {"operator": "eq", "version": "2.0.2", "name": "NetBSD"}, {"operator": "eq", "version": "1.6", "name": "NetBSD"}, {"operator": "eq", "version": "1.3", "name": "NetBSD"}, {"operator": "eq", "version": "1.6.1", "name": "NetBSD"}, {"operator": "eq", "version": "2.0.1", "name": "NetBSD"}, {"operator": "eq", "version": "2.0", "name": "NetBSD"}, {"operator": "eq", "version": "1.6.2", "name": "NetBSD"}], "enchantments": {"score": {"vector": "NONE", "value": 7.2}, "dependencies": {"references": [], "modified": "2017-04-28T13:20:17"}, "vulnersScore": 7.2}, "references": [], "id": "OSVDB:20730", "hash": "44035314d4977ca96a86b24b4aafd93f0f9fc46d9234609f6e85ef9b83c38f5e", "lastseen": "2017-04-28T13:20:17", "cvelist": [], "modified": "2005-10-31T00:00:00", "description": "## Vulnerability Description\nNetBSD contains a flaw related to the process file system (procfs) that may allow a malicious user to cause a negative uio_offset. No further details have been provided.\n## Technical Description\nWhile specific details regarding this vulnerability were not provided by the vendor, a negative offset should not be permitted when using the process file system (procfs).\n\nIf a malicious user causes a negative offset when reading from a procfs file, a system crash and/or kernel memory disclosure will result. Such memory might contain sensitive information, such as portions of the file cache or terminal buffers. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.\n## Solution Description\nUpgrade to version 2.0.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nNetBSD contains a flaw related to the process file system (procfs) that may allow a malicious user to cause a negative uio_offset. No further details have been provided.\n## References:\nVendor URL: http://www.netbsd.org/\n[Vendor Specific Advisory URL](http://mail-index.netbsd.org/netbsd-announce/2005/10/31/0000.html)\nSecurity Tracker: 1015132\n[Related OSVDB ID: 20725](https://vulners.com/osvdb/OSVDB:20725)\n[Related OSVDB ID: 20728](https://vulners.com/osvdb/OSVDB:20728)\n[Related OSVDB ID: 20731](https://vulners.com/osvdb/OSVDB:20731)\n[Related OSVDB ID: 20726](https://vulners.com/osvdb/OSVDB:20726)\n[Related OSVDB ID: 20727](https://vulners.com/osvdb/OSVDB:20727)\n[Related OSVDB ID: 20729](https://vulners.com/osvdb/OSVDB:20729)\nOther Advisory URL: http://www.uniras.gov.uk/niscc/docs/br-20051101-00969.html?lang=en\n"}