Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD multiple security vulnerabilities
Published:11.09.2013
Source:
SecurityVulns ID:13280
Type:local
Threat Level:
6/10
Description:ifioctls privilege escalation, nullfs privilege escalation, sendfile information leakage.
Affected:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.2
CVE:CVE-2013-5710 (The nullfs implementation in sys/fs/nullfs/null_vnops.c in the kernel in FreeBSD 8.3 through 9.2 allows local users with certain permissions to bypass access restrictions via a hardlink in a nullfs instance to a file in a different instance.)
 CVE-2013-5691 (The (1) IPv6 and (2) ATM ioctl request handlers in the kernel in FreeBSD 8.3 through 9.2-STABLE do not validate SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR, and SIOCSIFNETMASK requests, which allows local users to perform link-layer actions, cause a denial of service (panic), or possibly gain privileges via a crafted application.)
 CVE-2013-5666 (The sendfile system-call implementation in sys/kern/uipc_syscalls.c in the kernel in FreeBSD 9.2-RC1 and 9.2-RC2 does not properly pad transmissions, which allows local users to obtain sensitive information (kernel memory) via a length greater than the length of the file.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-13:12.ifioctl (11.09.2013)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-13:13.nullfs (11.09.2013)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-13:11.sendfile (11.09.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod