vulnerability
FreeBSD: VID-7240de58-6007-11e6-a6c3-14dae9d210b8 (CVE-2014-3952): FreeBSD -- Kernel memory disclosure in control messages and SCTP
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:C/I:N/A:N) | Aug 11, 2016 | Dec 10, 2025 | Dec 10, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:C/I:N/A:N)
Published
Aug 11, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Problem Description: Buffer between control message header and data may not be completely initialized before being copied to userland. [CVE-2014-3952] Three SCTP cmsgs, SCTP_SNDRCV, SCTP_EXTRCV and SCTP_RCVINFO, have implicit padding that may not be completely initialized before being copied to userland. In addition, three SCTP notifications, SCTP_PEER_ADDR_CHANGE, SCTP_REMOTE_ERROR and SCTP_AUTHENTICATION_EVENT, have padding in the returning data structure that may not be completely initialized before being copied to userland. [CVE-2014-3953] Impact: An unprivileged local process may be able to retrieve portion of kernel memory. For the generic control message, the process may be able to retrieve a maximum of 4 bytes of kernel memory. For SCTP, the process may be able to retrieve 2 bytes of kernel memory for all three control messages, plus 92 bytes for SCTP_SNDRCV and 76 bytes for SCTP_EXTRCV. If the local process is permitted to receive SCTP notification, a maximum of 112 bytes of kernel memory may be returned to userland. This information might be directly useful, or it might be leveraged to obtain elevated privileges in some way. For example, a terminal buffer might include a user-entered password.
Solutions
freebsd-upgrade-base-10_0-release-p7freebsd-upgrade-base-9_2-release-p10freebsd-upgrade-base-9_1-release-p17freebsd-upgrade-base-8_4-release-p14
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.