FreeBSD 9.3/10.1 sys_amd64 IRET Handler Kernel Panic denial of service : 8/27/2015 12:48:04 PM
Trial offer - 3 Months of GlowHost goodness for just $1.00 - Choose any shared plan for just 1 buck. From our sponsors |
| Vulnerability Advisories |
| Vulnerabilities of scip VulDB |
FreeBSD 9.3/10.1 sys_amd64 IRET Handler Kernel Panic denial of service
8/24/2015 7:00:00 PM
General
scipID: 77466
Affected: FreeBSD 9.3/10.1
Published: 08/25/2015 (Konstantin Belousov/Andrew Lutomirski)
Risk: problematic
Created: 08/27/2015
Entry: 70.9% complete
Summary
A vulnerability, which was classified as problematic, was found in FreeBSD 9.3/10.1. Affected is an unknown function of the component sys_amd64 IRET Handler. The manipulation with an unknown input leads to a denial of service vulnerability (kernel panic). This is going to have an impact on availability.
The weakness was released 08/25/2015 by Konstantin Belousov and Andrew Lutomirski as FreeBSD-SA-15:21.amd64 as confirmed advisory (Website). The advisory is shared for download at security.FreeBSD.org. This vulnerability is traded as CVE-2015-5675. The technical details are unknown and an exploit is not available. The advisory points out:
Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability is also documented in the vulnerability database at SecurityTracker (ID 1033376).FreeBSD/amd64 is commonly used on 64bit systems with AMD and Intel CPU’s. The GS segment CPU register is used by both user processes and the kernel to conveniently access state data: 32-bit user processes use the register to manage per-thread data, while the kernel uses it to access per-processor data. The return from interrupt (IRET) instruction returns program control from an interrupt handler to the interrupted context.
CVSS
Base Score: 1.5 (CVSS2#AV:A/AC:M/Au:S/C:N/I:N/A:P) [?]
Temp Score: 1.3 (CVSS2#E:ND/RL:OF/RC:C) [?]
CPE
Exploiting
Class: Denial of service
Local: Yes
Remote: No
Availability: No
Countermeasures
Recommended: Patch
Status: Official fix
Reaction Time: 0 days since reported
0-Day Time: 0 days since found
Exposure Time: 0 days since known
Timeline
08/25/2015 | Advisory disclosed
08/25/2015 | Countermeasure disclosed
08/26/2015 | SecurityTracker entry created
08/27/2015 | VulDB entry created
08/27/2015 | VulDB entry updated
Sources
Advisory: FreeBSD-SA-15:21.amd64
Researcher: Konstantin Belousov/Andrew Lutomirski
Status: Confirmed
CVE: CVE-2015-5675 (mitre.org) (nvd.nist.org) (cvedetails.com)
SecurityTracker: 1033376 – FreeBSD Kernel sys_amd64 IRET Handler Flaw Lets Local Users Deny Service or Gain Elevated Privileges
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions