Lucene search

K
freebsdFreeBSD7DBB7197-7B68-11DD-80BA-000BCDF0A03B
HistorySep 03, 2008 - 12:00 a.m.

FreeBSD -- nmount(2) local arbitrary code execution

2008-09-0300:00:00
vuxml.freebsd.org
13

0.0004 Low

EPSS

Percentile

0.4%

Problem Description:
Various user defined input such as mount points, devices, and
mount options are prepared and passed as arguments to
nmount(2) into the kernel. Under certain error conditions,
user defined data will be copied into a stack allocated buffer
stored in the kernel without sufficient bounds checking.
Impact:
If the system is configured to allow unprivileged users to
mount file systems, it is possible for a local adversary to
exploit this vulnerability and execute code in the context of
the kernel.
Workaround:
It is possible to work around this issue by allowing only
privileged users to mount file systems by running the
following sysctl(8) command:

sysctl vfs.usermount=0

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd= 6.3UNKNOWN
FreeBSDanynoarchfreebsd< 6.3_4UNKNOWN

0.0004 Low

EPSS

Percentile

0.4%