FreeBSD : FreeBSD -- Buffer overflow in keyboard driver (7bbc0e8c-600a-11e6-a6c3-14dae9d210b8)

High Nessus Plugin ID 92923


The remote FreeBSD host is missing one or more security-related updates.


Incorrect signedness comparison in the ioctl(2) handler allows a malicious local user to overwrite a portion of the kernel memory.
Impact : A local user may crash the kernel, read a portion of kernel memory and execute arbitrary code in kernel context. The result of executing an arbitrary kernel code is privilege escalation.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 92923

File Name: freebsd_pkg_7bbc0e8c600a11e6a6c314dae9d210b8.nasl

Version: $Revision: 2.3 $

Type: local

Published: 2016/08/12

Modified: 2016/12/08

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C


Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:FreeBSD-kernel, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/08/11

Vulnerability Publication Date: 2016/05/17

Exploitable With

Core Impact

Reference Information

CVE: CVE-2016-1886

FreeBSD: SA-16:18.atkbd