Vulnerability Name:

CVE-2009-4358 (CCN-54529)

Assigned:2009-12-03
Published:2009-12-03
Updated:2009-12-21
Summary:freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) freebsd-update upgrade (upgrade) operation.
Per: http://security.freebsd.org/advisories/FreeBSD-SA-09:17.freebsd-update.asc

"2) To patch your present system:

The following patch has been verified to apply to FreeBSD 6.3, 6.4,
7.1, 7.2, and 8.0 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch http://security.FreeBSD.org/patches/SA-09:17/freebsd-update.patch
# fetch http://security.FreeBSD.org/patches/SA-09:17/freebsd-update.patch.asc"
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N)
4.1 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
1.8 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2009-4358

Source: CCN
Type: SA37575
FreeBSD freebsd-update Insecure Directory Permissions

Source: SECUNIA
Type: Vendor Advisory
37575

Source: CCN
Type: FreeBSD-SA-09:17.freebsd-update
Inappropriate directory permissions in freebsd-update(8)

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-09:17

Source: CCN
Type: OSVDB ID: 61108
FreeBSD freebsd-update Working Directory Permission Weakness Local Information Disclosure

Source: BID
Type: Patch
37190

Source: CCN
Type: BID-37190
FreeBSD 'freebsd-update' Utility Insecure Directory Permissions Vulnerability

Source: XF
Type: UNKNOWN
freebsd-freebsdupdate-info-disclosure(54529)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:6.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:6.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.2:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:8.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:6.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:6.4:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.1:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:7.2:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:8.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 6.3
    freebsd freebsd 6.4
    freebsd freebsd 7.1
    freebsd freebsd 7.2
    freebsd freebsd 8.0
    freebsd freebsd 6.3 -
    freebsd freebsd 6.4 -
    freebsd freebsd 7.1 -
    freebsd freebsd 7.2 stable
    freebsd freebsd 8.0 -