CVE-2005-0109

Description

Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.

5.6
CVSS
Severity: Medium
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.14%
Vendor Advisory sco.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory sun.com Vendor Advisory securitytracker.com Vendor Advisory securityfocus.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://www.kb.cert.org/vuls/id/911878 third party advisory us government resource
http://secunia.com/advisories/18165 third party advisory permissions required
http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754 broken link
http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2 mailing list
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt third party advisory vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9747 signature third party advisory vdb entry
http://www.vupen.com/english/advisories/2005/3002 vdb entry permissions required
http://secunia.com/advisories/15348 third party advisory permissions required
http://www.securityfocus.com/bid/12724 patch vdb entry vendor advisory third party advisory
http://marc.info/?l=freebsd-security&m=110994370429609&w=2 mailing list
http://www.redhat.com/support/errata/RHSA-2005-476.html vendor advisory not applicable
http://securitytracker.com/id?1013967 patch vdb entry vendor advisory third party advisory
http://www.vupen.com/english/advisories/2005/0540 vdb entry permissions required
http://www.daemonology.net/papers/htt.pdf third party advisory
http://www.redhat.com/support/errata/RHSA-2005-800.html vendor advisory not applicable
http://www.daemonology.net/hyperthreading-considered-harmful/ third party advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1 vendor advisory
http://marc.info/?l=openbsd-misc&m=110995101417256&w=2 mailing list

Frequently Asked Questions

What is the severity of CVE-2005-0109?
CVE-2005-0109 has been scored as a medium severity vulnerability.
How to fix CVE-2005-0109?
To fix CVE-2005-0109, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2005-0109 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2005-0109 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.