CVE-2013-2171
FreeBSD 9 - Address Space Manipulation Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
The vm_map_lookup function in sys/vm/vm_map.c in the mmap implementation in the kernel in FreeBSD 9.0 through 9.1-RELEASE-p4 does not properly determine whether a task should have write access to a memory location, which allows local users to bypass filesystem write permissions and consequently gain privileges via a crafted application that leverages read permissions, and makes mmap and ptrace system calls.
La función vm_map_lookup en sys/vm/vm_map.c en la ejecución de "mmap" en el kernel en FreeBSD v9.0 hasta v9.1-RELEASE-p4 no determina correctamente si una tarea debe tener acceso de escritura a una posición de memoria, que permite a los usuarios locales saltarse permisos de escritura del sistema de archivos y por lo tanto obtener privilegios a través de una aplicación manipulada que aprovecha permisos de lectura, y que hace llamadas al sistema "mmap" y "ptrace".
Due to insufficient permission checks in the virtual memory system, a tracing process (such as a debugger) may be able to modify portions of the traced process's address space to which the traced process itself does not have write access. This error can be exploited to allow unauthorized modification of an arbitrary file to which the attacker has read access, but not write access. Depending on the file and the nature of the modifications, this can result in privilege escalation. To exploit this vulnerability, an attacker must be able to run arbitrary code with user privileges on the target system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-02-19 CVE Reserved
- 2013-06-18 CVE Published
- 2013-06-19 First Exploit
- 2024-08-06 CVE Updated
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://svnweb.freebsd.org/base?view=revision&revision=251901 | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/122135 | 2013-06-22 | |
https://packetstorm.news/files/id/122164 | 2013-06-26 | |
https://packetstorm.news/files/id/122095 | 2013-06-19 | |
https://packetstorm.news/files/id/122090 | 2013-06-19 | |
https://www.exploit-db.com/exploits/26454 | 2013-06-26 | |
https://www.exploit-db.com/exploits/26368 | 2013-06-21 | |
https://github.com/0xGabe/FreeBSD-9.0-9.1-Privilege-Escalation | 2021-11-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2013/dsa-2714 | 2019-03-18 | |
http://www.freebsd.org/security/advisories/FreeBSD-SA-13:06.mmap.asc | 2019-03-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 9.0 Search vendor "Freebsd" for product "Freebsd" and version "9.0" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 9.1 Search vendor "Freebsd" for product "Freebsd" and version "9.1" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 9.1 Search vendor "Freebsd" for product "Freebsd" and version "9.1" | p4 |
Affected
|