Vulnerability CVE-2020-7457


Published: 2020-07-09

Description:
In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.

See advisories in our WLB2 database:
Topic
Author
Date
High
FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
Brendan Coles
01.08.2020

Type:

CWE-416

(Use After Free)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Freebsd -> Freebsd 

 References:
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:20.ipv6.asc

Copyright 2024, cxsecurity.com

 

Back to Top