Computer Security
[EN] securityvulns.ru
no-pyccku

  

FreeBSD kernel privilege escalation
updated since 13.06.2012
Published:25.06.2012
Source:
SecurityVulns ID:12411
Type:local
Threat Level:
6/10
Description:Privilege escalation on susret on some CPUs.
Affected:FREEBSD : FreeBSD 7.4
 FREEBSD : FreeBSD 9.0
 FREEBSD : FreeBSD 8.3
CVE:CVE-2012-0217 (The User Mode Scheduler in the kernel in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 on the Intel x64 platform does not properly handle system requests, which allows local users to gain privileges via a crafted application, aka "User Mode Scheduler Memory Corruption Vulnerability.")
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-12:04.sysret [REVISED] (25.06.2012)
 documentFREEBSD, CVE-2012-0217 (13.06.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod

 
 



Rating@Mail.ru