Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-08954

Опубликовано: 12 дек. 2023
Источник: fstec
CVSS3: 5.3
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость NFS клиента операционных систем FreeBSD связана с выходом операции за границы буфера в памяти. Эксплуатация уязвимости может позволить нарушителю получить доступ к конфиденциальной информации

Вендор

FreeBSD Project

Наименование ПО

FreeBSD

Версия ПО

13.2 (FreeBSD)
14.0 (FreeBSD)
13.2 p1 (FreeBSD)
13.2 p2 (FreeBSD)
13.2 p3 (FreeBSD)
13.2 p4 (FreeBSD)
13.2 p5 (FreeBSD)
13.2 p6 (FreeBSD)
13.2 p7 (FreeBSD)
14.0 beta5 (FreeBSD)
14.0 p1 (FreeBSD)
14.0 p2 (FreeBSD)
14.0 rc3 (FreeBSD)
14.0 rc4-p1 (FreeBSD)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

FreeBSD Project FreeBSD 13.2
FreeBSD Project FreeBSD 14.0
FreeBSD Project FreeBSD 13.2 p1
FreeBSD Project FreeBSD 13.2 p2
FreeBSD Project FreeBSD 13.2 p3
FreeBSD Project FreeBSD 13.2 p4
FreeBSD Project FreeBSD 13.2 p5
FreeBSD Project FreeBSD 13.2 p6
FreeBSD Project FreeBSD 13.2 p7
FreeBSD Project FreeBSD 14.0 beta5
FreeBSD Project FreeBSD 14.0 p1
FreeBSD Project FreeBSD 14.0 p2
FreeBSD Project FreeBSD 14.0 rc3
FreeBSD Project FreeBSD 14.0 rc4-p1

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,3)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:18.nfsclient.asc

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 53%
0.00302
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.5
nvd
около 2 лет назад

When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication. The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network. Note that the bug exists only in the NFS client; the

CVSS3: 6.5
github
около 2 лет назад

When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication. The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network. Note that the bug exists only in the NFS client; t...

EPSS

Процентиль: 53%
0.00302
Низкий

5.3 Medium

CVSS3

4.3 Medium

CVSS2