Lucene search

K
freebsdFreeBSDAED44C4E-C067-11E1-B5E0-000C299B62E1
HistoryJun 12, 2012 - 12:00 a.m.

FreeBSD -- Privilege escalation when returning from kernel

2012-06-1200:00:00
vuxml.freebsd.org
31

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

21.8%

Problem description:

FreeBSD/amd64 runs on CPUs from different vendors. Due to varying
behaviour of CPUs in 64 bit mode a sanity check of the kernel may be
insufficient when returning from a system call.
Successful exploitation of the problem can lead to local kernel privilege
escalation, kernel data corruption and/or crash.
To exploit this vulnerability, an attacker must be able to run code with user
privileges on the target system.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd= 7.4UNKNOWN
FreeBSDanynoarchfreebsd< 7.4_9UNKNOWN

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

21.8%