// For flags

CVE-2024-25941

jail(2) information leak

Severity Score

"-"
*CVSS v-

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

The jail(2) system call has not limited a visiblity of allocated TTYs (the kern.ttys sysctl). This gives rise to an information leak about processes outside the current jail.

Attacker can get information about TTYs allocated on the host or in other jails. Effectively, the information printed by "pstat -t" may be leaked.

La llamada al sistema jail(2) no ha limitado la visibilidad de los TTY asignados (el sysctl kern.ttys). Esto da lugar a una filtración de información sobre procesos fuera de la actual cárcel. El atacante puede obtener información sobre los TTY asignados en el host o en otras cárceles. Efectivamente, la información impresa por "pstat -t" puede filtrarse.

*Credits: Pawel Jakub Dawidek
CVSS Scores
Attack Vector
-
Attack Complexity
-
Privileges Required
-
User Interaction
-
Scope
-
Confidentiality
-
Integrity
-
Availability
-
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-02-13 CVE Reserved
  • 2024-02-15 CVE Published
  • 2024-02-15 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
---- -