7.2
CVSSv2

CVE-2011-4062

Published: 18/10/2011 Updated: 13/12/2011
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in the kernel in FreeBSD 7.3 up to and including 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freebsd freebsd 9.0

freebsd freebsd 8.1

freebsd freebsd 8.2

freebsd freebsd 7.3

freebsd freebsd 7.4

Vendor Advisories

Debian Bug report logs - #645377 kfreebsd-8: Buffer overflow in handling of UNIX socket addresses Package: kfreebsd-8; Maintainer for kfreebsd-8 is (unknown); Reported by: Michael Gilbert <michaelsgilbert@gmailcom> Date: Sat, 15 Oct 2011 04:06:01 UTC Severity: serious Found in version 81 Fixed in versions 90~svn2258 ...
Buffer overflow in the Linux emulation support in FreeBSD kernel allows local users to cause a denial of service (panic) and possibly execute arbitrary code by calling the bind system call with a long path for a UNIX-domain socket, which is not properly handled when the address is used by other unspecified system calls For the stable distribution ...

Exploits

#!/bin/sh # # fbsd-uipcsock-heapsh, by Shaun Colley <scolley@ioactivecom>, 29/09/11 # # proof-of-concept crash for the freebsd unix domain sockets heap # overflow this was tested on freebsd 82-RELEASE just a PoC for now # # see advisory & patches for details: # wwwsecurityfocuscom/archive/1/519864/30/0/threaded # # this P ...