Buffer overflow in NetBSD - #VU8450
Published: September 15, 2017
Vulnerability identifier: #VU8450
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-120
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: NetBSD Foundation, Inc
Affected software:
NetBSD
NetBSD
Detailed vulnerability description
The vulnerability allows a local attacker to execute arbitrary code on the target system.
The weakness exists due to insufficient bounds checking when reading or writing the color map using the WSDISPLAYIO_GETCMAP and WSDISPLAYIO_PUTCMAP ioctls. A local attacker can use a wscons terminal, trigger a buffer overflow and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to insufficient bounds checking when reading or writing the color map using the WSDISPLAYIO_GETCMAP and WSDISPLAYIO_PUTCMAP ioctls. A local attacker can use a wscons terminal, trigger a buffer overflow and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.