CVE-2019-5596
FreeBSD 12.0 - 'fd' Local Privilege Escalation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail.
En FreeBSD 11.2-STABLE tras r338618 y antes de r343786, 12.0-STABLE antes de r343781 y 12.0-RELEASE antes de 12.0-RELEASE-p3, un error en la implementación del conteo de referencias para los sockets del dominio UNIX pueden provocar que se lance incorrectamente una estructura de datos. Esto podría permitir que un usuario local malicioso obtenga privilegios root o escape de una cárcel.
FreeBSD 12.0 attempts to handle the case where the receiving process does not provide a sufficiently large buffer for an incoming control message containing rights. In particular, to avoid leaking the corresponding descriptors into the receiving process' descriptor table, the kernel handles the truncation case by closing descriptors referenced by the discarded message. The code which performs this operation failed to release a reference obtained on the file corresponding to a received right. This bug can be used to cause the reference counter to wrap around and free the file structure. A local user can exploit the bug to gain root privileges or escape from a jail.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-07 CVE Reserved
- 2019-02-06 CVE Published
- 2019-07-10 First Exploit
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/155790/FreeBSD-fd-Privilege-Escalation.html | X_refsource_misc |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/155790 | 2019-12-30 | |
https://www.exploit-db.com/exploits/47081 | 2019-07-10 | |
https://www.exploit-db.com/exploits/47829 | 2019-12-30 | |
https://github.com/raymontag/CVE-2019-5596 | 2023-03-29 |
URL | Date | SRC |
---|---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:02.fd.asc | 2020-08-24 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 11.2 Search vendor "Freebsd" for product "Freebsd" and version "11.2" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 12.0 Search vendor "Freebsd" for product "Freebsd" and version "12.0" | - |
Affected
|