Vulnerability Details : CVE-2016-1885
Potential exploit
Integer signedness error in the amd64_set_ldt function in sys/amd64/amd64/sys_machdep.c in FreeBSD 9.3 before p39, 10.1 before p31, and 10.2 before p14 allows local users to cause a denial of service (kernel panic) via an i386_set_ldt system call, which triggers a heap-based buffer overflow.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2016-1885
- cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-1885
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-1885
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST | |
6.2
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.5
|
3.6
|
NIST |
CWE ids for CVE-2016-1885
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-1885
-
http://seclists.org/fulldisclosure/2016/Mar/67
Full Disclosure: Re: [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow
-
http://www.securityfocus.com/archive/1/537812/100/0/threaded
SecurityFocus
-
http://www.securityfocus.com/archive/1/537813/100/0/threaded
SecurityFocus
-
https://www.exploit-db.com/exploits/39570/
FreeBSD 10.2 (x64) - 'amd64_set_ldt' Heap OverflowExploit
-
http://www.coresecurity.com/advisories/freebsd-kernel-amd64setldt-heap-overflow
FreeBSD Kernel amd64_set_ldt Heap Overflow | Core Security
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:15.sysarch.asc
Vendor Advisory
-
http://packetstormsecurity.com/files/136276/FreeBSD-Kernel-amd64_set_ldt-Heap-Overflow.html
FreeBSD Kernel amd64_set_ldt Heap Overflow ≈ Packet StormExploit
-
http://www.securitytracker.com/id/1035309
FreeBSD sysarch(2) Input Validation Flaw Lets Local Users Cause Denial of Service Conditions on the Target System - SecurityTracker
-
http://seclists.org/fulldisclosure/2016/Mar/56
Full Disclosure: [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow
Jump to