Vulnerability Name:

CVE-2005-4779 (CCN-26377)

Assigned:2005-10-31
Published:2005-10-31
Updated:2008-09-05
Summary:verifiedexecioctl in verified_exec.c in NetBSD 2.0.2 calls NDINIT with UIO_USERSPACE rather than UID_SYSSPACE, which removes the functionality of the verified exec kernel subsystem and might allow local users to execute Trojan horse programs.
CVSS v3 Severity:3.9 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.6 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
3.2 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2005-4779

Source: CONFIRM
Type: UNKNOWN
http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/dev/verified_exec.c.diff?r1=1.4&r2=1.4.2.1&f=h

Source: CCN
Type: NetBSD CVS Repositories Web site
uvm_swap.c

Source: CCN
Type: NetBSD Announcement, 10/31/2005 09:52:13
Announcing update 2.0.3 - source only

Source: MLIST
Type: Patch
[netbsd-announce] 20051031 Announcing update 2.0.3 - source only

Source: CONFIRM
Type: UNKNOWN
http://releng.netbsd.org/cgi-bin/req-2-0.cgi?show=1988

Source: OSVDB
Type: Patch
20725

Source: CCN
Type: OSVDB ID: 20725
NetBSD Verified exec Failure

Source: XF
Type: UNKNOWN
netbsd-verifiedexec-command-execution(26377)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netbsd netbsd 2.0
    netbsd netbsd 2.0.1
    netbsd netbsd 2.0.2
    netbsd netbsd 2.0
    netbsd netbsd 2.0.1
    netbsd netbsd 2.0.2