FreeBSD 11.x < 11.2-RELEASE-p14 / 11.x < 11.3-RELEASE-p3 / 12.x < 12.0-RELEASE-p10 midistat Race Condition

high Nessus Plugin ID 128415

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The version of the FreeBSD kernel running on the remote host is 11.x prior to 11.2-RELEASE-p14, 11.x prior to 11.3-RELEASE-p3, or 12.x prior to 12.0-RELEASE-p10. It is, therefore, affected by an out-of-bounds memory access race condition in midistat. An authenticated attacker could exploit this, via a specially crafted program, to cause an out-of-bounds memory access and a subsequent kernel panic.

Solution

Upgrade to the appropriate FreeBSD version.

See Also

https://www.freebsd.org/security/advisories/FreeBSD-SA-19:23.midi.asc

Plugin Details

Severity: High

ID: 128415

File Name: freebsd_sa-19-23_midi.nasl

Version: 1.3

Type: local

Published: 8/30/2019

Updated: 4/30/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2019-5612

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release

Exploit Ease: No known exploits are available

Patch Publication Date: 8/20/2019

Vulnerability Publication Date: 8/20/2019

Reference Information

CVE: CVE-2019-5612