Debian DSA-2714-1 : kfreebsd-9 - programming error

medium Nessus Plugin ID 66976

Synopsis

The remote Debian host is missing a security-related update.

Description

Konstantin Belousov and Alan Cox discovered that insufficient permission checks in the memory management of the FreeBSD kernel could lead to privilege escalation.

Solution

Upgrade the kfreebsd-9 packages.

For the stable distribution (wheezy), this problem has been fixed in version 9.0-10+deb70.2.

See Also

https://packages.debian.org/source/wheezy/kfreebsd-9

https://www.debian.org/security/2013/dsa-2714

Plugin Details

Severity: Medium

ID: 66976

File Name: debian_DSA-2714.nasl

Version: 1.11

Type: local

Agent: unix

Published: 6/26/2013

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:kfreebsd-9, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/25/2013

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (FreeBSD 9 Address Space Manipulation Privilege Escalation)

Reference Information

CVE: CVE-2013-2171

BID: 60615

DSA: 2714