FreeBSD : FreeBSD -- Privilege escalation in cd(4) driver (14a3b376-b30a-11e9-a87f-a4badb2f4699)

high Nessus Plugin ID 127540

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

To implement one particular ioctl, the Linux emulation code used a special interface present in the cd(4) driver which allows it to copy subchannel information directly to a kernel address. This interface was erroneously made accessible to userland, allowing users with read access to a cd(4) device to arbitrarily overwrite kernel memory when some media is present in the device. Impact : A user in the operator group can make use of this interface to gain root privileges on a system with a cd(4) device when some media is present in the device.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?1cef6cbe

Plugin Details

Severity: High

ID: 127540

File Name: freebsd_pkg_14a3b376b30a11e9a87fa4badb2f4699.nasl

Version: 1.4

Type: local

Published: 8/12/2019

Updated: 5/7/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-5602

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freebsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/30/2019

Vulnerability Publication Date: 7/2/2019

Exploitable With

Core Impact

Reference Information

CVE: CVE-2019-5602

FreeBSD: SA-19:11.cd_ioctl