// For flags

CVE-2016-1886

FreeBSD Kernel (FreeBSD 10.2 < 10.3 x64) - 'SETFKEY' (PoC)

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer signedness error in the genkbd_commonioctl function in sys/dev/kbd/kbd.c in FreeBSD 9.3 before p42, 10.1 before p34, 10.2 before p17, and 10.3 before p3 allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory overwrite and kernel crash), or gain privileges via a negative value in the flen structure member in the arg argument in a SETFKEY ioctl call, which triggers a "two way heap and stack overflow."

Error de entero sin signo en la función genkbd_commonioctl en sys/dev/kbd/kbd.c en FreeBSD 9.3 en versiones anteriores a p42, 10.1 en versiones anteriores a p34, 10.2 en versiones anteriores a p17 y 10.3 en versiones anteriores a p3 permite a usuarios locales obtener información sensible de la memoria del kernel, causar una denegación de servicio (sobrescribir memoria y caída del kernel), u obtener privilegios a través de un valor negativo en el mimebro de estructura flen en el argumento arg en una llamada SETFKEY ioctl, lo que desencadena un "desbordamiento de pila y memoria dinámica en dos sentidos"

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-01-13 CVE Reserved
  • 2016-05-18 CVE Published
  • 2016-05-29 First Exploit
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
9.3
Search vendor "Freebsd" for product "Freebsd" and version "9.3"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
10.1
Search vendor "Freebsd" for product "Freebsd" and version "10.1"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
10.2
Search vendor "Freebsd" for product "Freebsd" and version "10.2"
-
Affected
Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
10.3
Search vendor "Freebsd" for product "Freebsd" and version "10.3"
-
Affected