Vulnerability Details : CVE-2020-7457
Public exploit exists!
In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.
Products affected by CVE-2020-7457
- cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p7:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p8:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p10:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.3:p9:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7457
39.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-7457
-
FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
Disclosure Date: 2020-07-07First seen: 2020-07-29exploit/freebsd/local/ip6_setpktopt_uaf_priv_escThis module exploits a race and use-after-free vulnerability in the FreeBSD kernel IPv6 socket handling. A missing synchronization lock in the `IPV6_2292PKTOPTIONS` option handling in `setsockopt` permits racing `ip6_setpktopt` access to a freed `ip6_pktopts`
CVSS scores for CVE-2020-7457
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST |
CWE ids for CVE-2020-7457
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
-
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.Assigned by: nvd@nist.gov (Primary)
-
The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7457
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:20.ipv6.asc
Patch;Vendor Advisory
-
https://security.netapp.com/advisory/ntap-20200724-0002/
July 2020 FreeBSD Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html
FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to