Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hgfp-qxpq-6q7w

Опубликовано: 05 сент. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory.

Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory.

Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

EPSS

Процентиль: 77%
0.01002
Низкий

8.4 High

CVSS3

Дефекты

CWE-1284
CWE-790

Связанные уязвимости

CVSS3: 8.8
nvd
больше 1 года назад

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость функции ctl_report_supported_opcodes() подсистемы ctl операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 77%
0.01002
Низкий

8.4 High

CVSS3

Дефекты

CWE-1284
CWE-790