Computer Security
[EN] securityvulns.ru no-pyccku


setusercontext() privilege escalation in BSD systems
Published:24.08.2009
Source:
SecurityVulns ID:10172
Type:library
Threat Level:
5/10
Description:Multiple application misbihave if different limits are set via setusercontext(), resulting in different exploitation scenarios.
Affected:FREEBSD : FreeBSD 7.0
 FREEBSD : FreeBSD 7.1
 FREEBSD : FreeBSD 7.2
Original documentdocumentKingcope, [email protected] (24.08.2009)

BSD systems kevent race conditions
updated since 24.08.2009
Published:15.09.2009
Source:
SecurityVulns ID:10173
Type:local
Threat Level:
6/10
Description:Race conditions on SMP systems.
Affected:FREEBSD : FreeBSD 6.1
 NETBSD : NetBSD 5.0
 DRAGONFLYBSD : DragonFlyBSD 2.2
Original documentdocumentPrzemyslaw Frasunek, Re: [Full-disclosure] FreeBSD <= 6.1 kqueue() NULL pointer dereference (15.09.2009)
 documentPrzemyslaw Frasunek, FreeBSD <= 6.1 kqueue() NULL pointer dereference (24.08.2009)
 documentPrzemyslaw Frasunek, FreeBSD <= 6.1 kqueue() NULL pointer dereference (24.08.2009)
Files:FreeBSD 6.1 kevent() race condition exploit

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod