FreeBSD : FreeBSD -- Privilege escalation via mmap (abef280d-d829-11e2-b71c-8c705af55518)

Medium Nessus Plugin ID 66919


The remote FreeBSD host is missing a security-related update.


Due to insufficient permission checks in the virtual memory system, a tracing process (such as a debugger) may be able to modify portions of the traced process's address space to which the traced process itself does not have write access.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 66919

File Name: freebsd_pkg_abef280dd82911e2b71c8c705af55518.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2013/06/19

Modified: 2016/08/10

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:FreeBSD, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/06/18

Vulnerability Publication Date: 2013/06/18

Exploitable With


Core Impact

Metasploit (FreeBSD 9 Address Space Manipulation Privilege Escalation)

Reference Information

CVE: CVE-2013-2171

BID: 60615

OSVDB: 94414

FreeBSD: SA-13:06.mmap