Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1886

Опубликовано: 25 мая 2016
Источник: debian

Описание

Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-10fixed10.3~svn300087-1package

Примечания

  • kfreebsd not covered by security support in Jessie

Связанные уязвимости

CVSS3: 7.8
nvd
больше 9 лет назад

Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."

CVSS3: 7.8
github
больше 3 лет назад

Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."

CVSS3: 8.4
fstec
больше 9 лет назад

Уязвимость операционной системы FreeBSD, позволяющая нарушителю получить конфиденциальную информацию из памяти ядра, вызвать отказ в обслуживании или повысить свои привилегии