Vulnerability Details : CVE-2014-3953
FreeBSD 8.4 before p14, 9.1 before p17, 9.2 before p10, and 10.0 before p7 does not properly initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via a (1) SCTP_SNDRCV, (2) SCTP_EXTRCV, or (3) SCTP_RCVINFO SCTP cmsg or a (4) SCTP_PEER_ADDR_CHANGE, (5) SCTP_REMOTE_ERROR, or (6) SCTP_AUTHENTICATION_EVENT notification.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2014-3953
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2014-3953
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:C/I:N/A:N |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2014-3953
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3953
-
http://www.securitytracker.com/id/1030539
FreeBSD Kernel Memory Initialization Flaws Lets Local Users Gain Elevated Privileges - SecurityTracker
-
http://www.debian.org/security/2014/dsa-3070
Debian -- Security Information -- DSA-3070-1 kfreebsd-9
-
http://www.freebsd.org/security/advisories/FreeBSD-SA-14:17.kmem.asc
Vendor Advisory
Products affected by CVE-2014-3953
- cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*