Vulnerability Name:

CVE-2009-3527 (CCN-52690)

Assigned:2009-08-22
Published:2009-08-22
Updated:2009-10-07
Summary:Race condition in the Pipe (IPC) close function in FreeBSD 6.3 and 6.4 allows local users to cause a denial of service (crash) or gain privileges via vectors related to kqueues, which triggers a use after free, leading to a NULL pointer dereference or memory corruption.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.7 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.9 Medium (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
5.7 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-362
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Full-Disclosure Mailing List, Sat Aug 22 2009 - 12:19:40 CDT
FreeBSD <= 6.1 kqueue() NULL pointer dereference

Source: CCN
Type: Full-Disclosure Mailing List, Sun Sep 13 2009 - 03:49:33 CDT
FreeBSD <= 6.1 kqueue() NULL pointer dereference

Source: MITRE
Type: CNA
CVE-2009-3527

Source: OSVDB
Type: UNKNOWN
58544

Source: CCN
Type: SA36955
FreeBSD Privilege Escalation Vulnerabilities

Source: FREEBSD
Type: Patch
FreeBSD-SA-09:13

Source: CCN
Type: SECTRACK ID: 1022982
FreeBSD kqueue Pipe Race Condition Lets Local Users Gain Elevated Privileges

Source: CCN
Type: DragonFlyBSD Web site
DragonFlyBSD

Source: CCN
Type: FreeBSD Web site
FreeBSD

Source: CCN
Type: NetBSD Web site
NetBSD

Source: CCN
Type: OSVDB ID: 58544
FreeBSD kqueues Pipe close() Implementation Race Condition Arbitrary Code Execution

Source: BUGTRAQ
Type: Exploit
20090913 Re: [Full-disclosure] FreeBSD <= 6.1 kqueue() NULL pointer dereference

Source: CCN
Type: BID-36101
Multiple Vendor BSD 'kevent()' Race Condition Vulnerability

Source: BID
Type: Patch
36375

Source: CCN
Type: BID-36375
FreeBSD 'kqueue' NULL Pointer Dereference Privilege Escalation Vulnerability

Source: SECTRACK
Type: Patch
1022982

Source: XF
Type: UNKNOWN
bsd-kqueue-code-execution(52690)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:6.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:6.4:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:6.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:5.5:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:6.1:-:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:4.0:beta2:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.0:rc3:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:5.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 6.3
    freebsd freebsd 6.4
    freebsd freebsd 5.2 -
    freebsd freebsd 5.2.1 -
    freebsd freebsd 5.3 -
    freebsd freebsd 5.4 -
    freebsd freebsd 6.0 -
    freebsd freebsd 5.5 -
    freebsd freebsd 6.1 -
    netbsd netbsd 4.0 beta2
    netbsd netbsd 4.0
    netbsd netbsd 4.0.1
    netbsd netbsd 5.0
    netbsd netbsd 5.0 rc3
    netbsd netbsd 5.0.1
    dragonflybsd dragonflybsd 1.1
    dragonflybsd dragonflybsd 1.2
    dragonflybsd dragonflybsd 1.10.1