Privilege escalation in FreeBSD - #VU1106
Published: October 26, 2016 / Updated: October 31, 2016
Vulnerability identifier: #VU1106
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: FreeBSD Foundation
Affected software:
FreeBSD
FreeBSD
Detailed vulnerability description
The vulnerability allows a local user on the guest system to gain elevated privileges on the host system.
The weakness is due to insufficient access control. By causing an array reference error in the VGA device emulation code, a local attacker can modify the heap, execute arbitrary code with root privileges and gain elevated privileges on the host system.
Successful exploitation of the vulnerability results in privilege escalation on the target system.
The weakness is due to insufficient access control. By causing an array reference error in the VGA device emulation code, a local attacker can modify the heap, execute arbitrary code with root privileges and gain elevated privileges on the host system.
Successful exploitation of the vulnerability results in privilege escalation on the target system.
Remediation
Update patched version from the vendor's web site.