SB2011111706 - Path traversal in FreeBSD



SB2011111706 - Path traversal in FreeBSD

Published: November 17, 2011 Updated: August 11, 2020

Security Bulletin ID SB2011111706
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Path traversal (CVE-ID: CVE-2011-4122)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in openpam_configure.c in OpenPAM before r478 on FreeBSD 8.1. A remote authenticated attacker can send a specially crafted HTTP request and local users to load arbitrary DSOs and gain privileges via a . (dot dot) in the service_name argument to the pam_start function, as demonstrated by a . in the -c option to kcheckpass.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.