Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-94j5-29m8-f8jq

Опубликовано: 05 сент. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.2

Описание

An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller.

A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller.

A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

EPSS

Процентиль: 30%
0.00112
Низкий

8.2 High

CVSS3

Дефекты

CWE-193
CWE-787

Связанные уязвимости

CVSS3: 8.2
nvd
больше 1 года назад

An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.

CVSS3: 8.2
fstec
больше 1 года назад

Уязвимость гипервизора bhyve ядра операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 30%
0.00112
Низкий

8.2 High

CVSS3

Дефекты

CWE-193
CWE-787