cve-2025-0662
Vulnerability from cvelistv5
Published
2025-01-30 04:49
Modified
2025-02-07 17:02
Severity ?
EPSS score ?
Summary
Uninitialized kernel memory disclosure via ktrace(2)
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-0662", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-30T15:20:56.339386Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-31T20:00:09.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-02-07T17:02:55.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250207-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "ktrace" ], "product": "FreeBSD", "vendor": "FreeBSD", "versions": [ { "lessThan": "p1", "status": "affected", "version": "14.2-RELEASE", "versionType": "release" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Yichen Chai" }, { "lang": "en", "type": "finder", "value": "Zhuo Ying Jiang Li" } ], "datePublic": "2025-01-29T21:33:19.000Z", "descriptions": [ { "lang": "en", "value": "In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.\n\nIt is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-30T04:49:56.482Z", "orgId": "63664ac6-956c-4cba-a5d0-f46076e16109", "shortName": "freebsd" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.freebsd.org/advisories/FreeBSD-SA-25:04.ktrace.asc" } ], "title": "Uninitialized kernel memory disclosure via ktrace(2)" } }, "cveMetadata": { "assignerOrgId": "63664ac6-956c-4cba-a5d0-f46076e16109", "assignerShortName": "freebsd", "cveId": "CVE-2025-0662", "datePublished": "2025-01-30T04:49:56.482Z", "dateReserved": "2025-01-23T01:56:01.677Z", "dateUpdated": "2025-02-07T17:02:55.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-0662\",\"sourceIdentifier\":\"secteam@freebsd.org\",\"published\":\"2025-01-30T05:15:10.653\",\"lastModified\":\"2025-02-07T17:15:31.157\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.\\n\\nIt is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.\"},{\"lang\":\"es\",\"value\":\"En algunos casos, la funci\u00f3n ktrace registra el contenido de las estructuras del n\u00facleo en el espacio de usuario. En uno de esos casos, ktrace env\u00eda una direcci\u00f3n sockaddr de tama\u00f1o variable al espacio de usuario. All\u00ed, se copia la direcci\u00f3n sockaddr completa, incluso cuando es m\u00e1s corta que el tama\u00f1o completo. Esto puede provocar que se copien al espacio de usuario hasta 14 bytes no inicializados de memoria del n\u00facleo. Es posible que un programa de espacio de usuario sin privilegios filtre 14 bytes de una asignaci\u00f3n de mont\u00f3n del n\u00facleo al espacio de usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secteam@freebsd.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"references\":[{\"url\":\"https://security.freebsd.org/advisories/FreeBSD-SA-25:04.ktrace.asc\",\"source\":\"secteam@freebsd.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250207-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.