Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   procfs Vendors:   OpenBSD
OpenBSD procfs Integer Overflow Discloses Kernel Memory to Local Users
SecurityTracker Alert ID:  1010153
SecurityTracker URL:
CVE Reference:   CVE-2004-0482   (Links to External Site)
Updated:  May 20 2004
Original Entry Date:  May 13 2004
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): OpenBSD 3.3, 3.4
Description:   An integer overflow vulnerability was reported in OpenBSD in procfs. A local user may be able to read arbitrary kernel memory contents.

OpenBSD reported that there are several functions in procfs that do not properly validate user-supplied input. A local user may be able to read arbitrary kernel memory locations and potentially use the information to gain elevated privileges on the target system.

The proc filesystem is not used by default.

The vendor credits Deprotect Advisories with reporting this flaw.

Impact:   A local user can view arbitrary kernel memory locations. The local user may be able to use this information to obtain elevated privileges on the target system.
Solution:   The following source code patches are available:

The vendor indicates that using procfs is not recommended.

Vendor URL: (Links to External Site)
Cause:   Boundary error, Input validation error

Message History:   None.

 Source Message Contents

Subject:  OpenBSD procfs

 > SECURITY FIX: May 13, 2004
 > Check for integer overflow in procfs. Use of procfs is not recommended.
 > A source code patch exists which remedies this problem.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC