Vulnerability Name:

CVE-2016-1885 (CCN-111527)

Assigned:2016-03-16
Published:2016-03-16
Updated:2018-10-09
Summary:Integer signedness error in the amd64_set_ldt function in sys/amd64/amd64/sys_machdep.c in FreeBSD 9.3 before p39, 10.1 before p31, and 10.2 before p14 allows local users to cause a denial of service (kernel panic) via an i386_set_ldt system call, which triggers a heap-based buffer overflow.
CVSS v3 Severity:6.2 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.9 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2016-1885

Source: MISC
Type: Exploit
http://packetstormsecurity.com/files/136276/FreeBSD-Kernel-amd64_set_ldt-Heap-Overflow.html

Source: CCN
Type: BugTraq Mailing List, Wed, 16 Mar 2016 14:30:29 -0300
[CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: CCN
Type: BugTraq Mailing List, Wed, 16 Mar 2016 12:04:21 -0700
Re: [FD] [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: CCN
Type: Full-Disclosure Mailing List, Wed, 16 Mar 2016 14:30:29 -0300
[CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: FULLDISC
Type: UNKNOWN
20160316 [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: FULLDISC
Type: UNKNOWN
20160317 Re: [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: MISC
Type: UNKNOWN
http://www.coresecurity.com/advisories/freebsd-kernel-amd64setldt-heap-overflow

Source: BUGTRAQ
Type: UNKNOWN
20160316 [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: BUGTRAQ
Type: UNKNOWN
20160316 Re: [FD] [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: SECTRACK
Type: UNKNOWN
1035309

Source: XF
Type: UNKNOWN
freebsd-kernel-cve20161885-bo(111527)

Source: CCN
Type: Packet Storm Security [03-17-2016]
FreeBSD Kernel amd64_set_ldt Heap Overflow

Source: FREEBSD
Type: Vendor Advisory
FreeBSD-SA-16:15

Source: CCN
Type: FreeBSD SVN Web site
[base] Contents of /release/10.2.0/sys/x86/include/sysarch.h

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [03-16-2016]

Source: EXPLOIT-DB
Type: Exploit
39570

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:10.2:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:10.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 9.3
    freebsd freebsd 10.1
    freebsd freebsd 10.2
    freebsd freebsd 10.1