Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2008-0777
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
FreeBSD sendfile(2)函数 权限许可和访问控制
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
FreeBSD就是一种运行在Intel平台上、可以自由使用的开放源码Unix类系统。 FreeBSD在处理文件的访问控制时存在漏洞,本地攻击者可能利用此漏洞获取敏感信息。 当进程打开文件(和其他文件系统对象,如目录)时,会指定访问标记说明所要进行的读、写或其他操作。会对这些标记检查文件系统权限,然后存储到所生成的文件描述符,以验证之后的操作。 FreeBSD的sendfile(2)系统调用在从文件发送数据之前没有检查文件描述符访问标记,如果文件为只写的话,则即使用户无法读访问文件,用户进程仍可以打开文件并
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2008-0777
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2008-0777
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2008-0777

No comments yet


Leave a comment