Описание
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
Ссылки
- PatchVendor Advisory
- US Government Resource
- PatchVendor Advisory
- US Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 1.5 (включая)Версия до 2.8 (включая)
Одно из
cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*
EPSS
Процентиль: 28%
0.00098
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
EPSS
Процентиль: 28%
0.00098
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other