SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   FreeBSD Kernel Vendors:   FreeBSD
FreeBSD mbug Flag Error Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1024182
SecurityTracker URL:  http://securitytracker.com/id/1024182
CVE Reference:   CVE-2010-2693   (Links to External Site)
Date:  Jul 13 2010
Impact:   Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.1, 7.3, 8.0, 8.1
Description:   A vulnerability was reported in FreeBSD. A local user can obtain elevated privileges on the target system.

The system does not properly set the read-only flag when duplicating an mbuf buffer reference. A local user can exploit this flaw to cause data corruption of system files and obtain elevated privileges.

Ming Fu reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix and has provided the following solution instructions [quoted].

Perform one of the following:

1) Upgrade your vulnerable system to 7-STABLE or 8-STABLE, or to the
RELENG_8_1, RELENG_8_0, RELENG_7_3, or RELENG_7_1 security branch dated
after the correction date.

2) To update your vulnerable system via a source code patch:

The following patches have been verified to apply to FreeBSD 7.1, 7.3,
8.0 and 8.1 systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch http://security.FreeBSD.org/patches/SA-10:07/mbuf.patch
# fetch http://security.FreeBSD.org/patches/SA-10:07/mbuf.patch.asc

b) Apply the patch.

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.

3) To update your vulnerable system via a binary patch:

Systems running 7.1-RELEASE, 7.3-RELEASE, or 8.0-RELEASE on the i386 or
amd64 platforms can be updated via the freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

Now reboot the system.

The vendor's advisory is available at:

http://security.freebsd.org/advisories/FreeBSD-SA-10:07.mbuf.asc

Vendor URL:  security.freebsd.org/advisories/FreeBSD-SA-10:07.mbuf.asc (Links to External Site)
Cause:   Access control error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Tue, 13 Jul 2010 03:22:26 +0000
Subject:  FreeBSD Kernel


http://security.freebsd.org/advisories/FreeBSD-SA-10:07.mbuf.asc

CVE-2010-2693

Lost mbuf flag resulting in data corruption

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC