{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T15:42:51.055","vulnerabilities":[{"cve":{"id":"CVE-2018-17155","sourceIdentifier":"secteam@freebsd.org","published":"2018-09-28T13:29:00.923","lastModified":"2024-11-21T03:53:58.740","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In FreeBSD before 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984), and 10.4-RELEASE-p13, due to insufficient initialization of memory copied to userland in the getcontext and swapcontext system calls, small amounts of kernel memory may be disclosed to userland processes. Unprivileged authenticated local users may be able to access small amounts privileged kernel data."},{"lang":"es","value":"En FreeBSD, en versiones anteriores a 11.2-STABLE(r338983), 11.2-RELEASE-p4, 11.1-RELEASE-p15, 10.4-STABLE(r338984) y 10.4-RELEASE-p13, debido a la insuficiente inicialización de la memoria copiada al espacio de usuario en las llamadas del sistema getcontext y swapcontext, podrían divulgarse pequeñas cantidades de memoria del kernel al proceso del espacio de usuario. Los usuarios locales autenticados sin privilegios podrían ser capaces de acceder pequeñas cantidades de datos privilegiados del kernel."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndExcluding":"11.2","matchCriteriaId":"B7354D16-6431-43C2-97BA-EBBF482572C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*","matchCriteriaId":"BD5B9266-A927-4F62-8742-721CE9A4C4C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:10.4:p13:*:*:*:*:*:*","matchCriteriaId":"86FDD601-4F89-4CA3-BE1A-54EA02DAC008"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.1:p15:*:*:*:*:*:*","matchCriteriaId":"17D3DDDC-07B4-43ED-8E0B-FF2D293B0EE1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*","matchCriteriaId":"22365F7C-2B00-4B61-84E8-EFBA3B8CFDC0"}]}]}],"references":[{"url":"https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.asc","source":"secteam@freebsd.org","tags":["Patch","Vendor Advisory"]},{"url":"https://security.FreeBSD.org/advisories/FreeBSD-EN-18:12.mem.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}