FreeBSD 7.3 to 9.0-RC1 privilege escalation/denial of service

high Nessus Plugin ID 110559

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Buffer overflow in the 'Linux emulation' support in FreeBSD kernel allows local users to cause a denial of service (panic) and possibly execute arbitrary code by calling the bind system call with a long path for a UNIX-domain socket, which is not properly handled when the address is used by other unspecified system calls.

Solution

Upgrade your vulnerable system to 7-STABLE or 8-STABLE, or to the RELENG_8_2, RELENG_8_1, RELENG_7_4, or RELENG_7_3 security branch dated after the correction date.

See Also

http://secunia.com/advisories/46564

http://secunia.com/advisories/46202

http://security.freebsd.org/advisories/FreeBSD-SA-11:05.unix.asc

http://www.securitytracker.com/id?10261062

Plugin Details

Severity: High

ID: 110559

File Name: freebsd_ddos_priv.nasl

Version: 1.2

Type: local

Published: 6/15/2018

Updated: 6/18/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/17/2011

Vulnerability Publication Date: 10/17/2011

Reference Information

CVE: CVE-2011-4062

BID: 49862