Описание
Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
Ссылки
- ExploitThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2019-12-30 (исключая)
cpe:2.3:o:serenityos:serenityos:*:*:*:*:*:*:*:*
EPSS
Процентиль: 34%
0.00136
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-119
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
EPSS
Процентиль: 34%
0.00136
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-119