Lucene search

K
freebsdFreeBSD74389F22-6007-11E6-A6C3-14DAE9D210B8
HistoryNov 04, 2014 - 12:00 a.m.

FreeBSD -- Kernel stack disclosure in setlogin(2) / getlogin(2)

2014-11-0400:00:00
vuxml.freebsd.org
7

0.0004 Low

EPSS

Percentile

5.2%

Problem Description:
When setlogin(2) is called while setting up a new login
session, the login name is copied into an uninitialized
stack buffer, which is then copied into a buffer of the
same size in the session structure. The getlogin(2) system
call returns the entire buffer rather than just the portion
occupied by the login name associated with the session.
Impact:
An unprivileged user can access this memory by calling
getlogin(2) and reading beyond the terminating NUL character
of the resulting string. Up to 16 (FreeBSD 8) or 32 (FreeBSD
9 and 10) bytes of kernel memory may be leaked in this
manner for each invocation of setlogin(2).
This memory may contain sensitive information, such as
portions of the file cache or terminal buffers, which an
attacker might leverage to obtain elevated privileges.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd-kernel= 10.0UNKNOWN
FreeBSDanynoarchfreebsd-kernel< 10.0_12UNKNOWN

0.0004 Low

EPSS

Percentile

5.2%