Vulnerability Name: | CCN-7109 | ||||||
Published: | 2001-09-06 | ||||||
Updated: | 2001-09-06 | ||||||
Summary: | The semop function in the NetBSD kernel fails to properly handle bounds checking with unsigned values. If stack memory is executable, a local attacker could pass a large 'nsops' value stored in the user memory and copied to the processÂ’s kernel stack. In turn, this could allow the attacker to cause a kernel trap, call arbitrary kernel cokde, or execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: NetBSD Security Advisory 2001-015 Insufficient checking of lengths passed from userland to kernel Source: CCN Type: BID-3298 NetBSD semop Arbitrary Code Execution Vulnerability Source: XF Type: UNKNOWN kernel-semop-execute-code(7109) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |