FreeBSD 9.3/10.1 sys_amd64 IRET Handler Kernel Panic denial of service : 8/27/2015 12:48:04 PM

Trial offer - 3 Months of GlowHost goodness for just $1.00 - Choose any shared plan for just 1 buck.
From our sponsors
 

 

Vulnerability Advisories
Vulnerabilities of scip VulDB

FreeBSD 9.3/10.1 sys_amd64 IRET Handler Kernel Panic denial of service
8/24/2015 7:00:00 PM

General

scipID: 77466
Affected: FreeBSD 9.3/10.1
Published: 08/25/2015 (Konstantin Belousov/Andrew Lutomirski)
Risk: problematic

Created: 08/27/2015
Entry: 70.9% complete

Summary

A vulnerability, which was classified as problematic, was found in FreeBSD 9.3/10.1. Affected is an unknown function of the component sys_amd64 IRET Handler. The manipulation with an unknown input leads to a denial of service vulnerability (kernel panic). This is going to have an impact on availability.

The weakness was released 08/25/2015 by Konstantin Belousov and Andrew Lutomirski as FreeBSD-SA-15:21.amd64 as confirmed advisory (Website). The advisory is shared for download at security.FreeBSD.org. This vulnerability is traded as CVE-2015-5675. The technical details are unknown and an exploit is not available. The advisory points out:

FreeBSD/amd64 is commonly used on 64bit systems with AMD and Intel CPU’s. The GS segment CPU register is used by both user processes and the kernel to conveniently access state data: 32-bit user processes use the register to manage per-thread data, while the kernel uses it to access per-processor data. The return from interrupt (IRET) instruction returns program control from an interrupt handler to the interrupted context.

Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability is also documented in the vulnerability database at SecurityTracker (ID 1033376).

CVSS

Base Score: 1.5 (CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:P) [?]
Temp Score: 1.3 (CVSS2#E:ND/RL:OF/RC:C) [?]

CPE

Exploiting

Class: Denial of service
Local: Yes
Remote: No

Availability: No

Countermeasures

Recommended: Patch
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known

Timeline

08/25/2015 | Advisory disclosed
08/25/2015 | Countermeasure disclosed
08/26/2015 | SecurityTracker entry created
08/27/2015 | VulDB entry created
08/27/2015 | VulDB entry updated

Sources

Advisory: FreeBSD-SA-15:21.amd64
Researcher: Konstantin Belousov/Andrew Lutomirski
Status: Confirmed

CVE: CVE-2015-5675 (mitre.org) (nvd.nist.org) (cvedetails.com)

SecurityTracker: 1033376 – FreeBSD Kernel sys_amd64 IRET Handler Flaw Lets Local Users Deny Service or Gain Elevated Privileges

 

You are receiving this email because you subscribed to this feed at feedmyinbox.com

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

Diberdayakan oleh Blogger.