Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2x5v-f8wh-jpf6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

EPSS

Процентиль: 34%
0.0014
Низкий

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 7.8
nvd
почти 6 лет назад

grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

EPSS

Процентиль: 34%
0.0014
Низкий

Дефекты

CWE-269