Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - FreeBSD: privilege escalation via IRET

October 2015 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/offer

SYNTHESIS OF THE VULNERABILITY

A local attacker can trigger an interruption with an exception on
FreeBSD, in order to escalate his privileges or to trigger a
denial of service.

Impacted products: FreeBSD.

Severity: 2/4.

Creation date: 26/08/2015.

DESCRIPTION OF THE VULNERABILITY

The GS segment contains data of the current thread (user mode) or
the current processor (kernel mode).

The IRET instruction leaves the interruption handler, and returns
to the interrupted context.

However, on an x64 environment, if an IRET occurs with an #SS
(Stack-Segment Fault) or #PF (Page Fault) exception, the kernel
uses the GS segment of the user mode (instead of using the kernel
mode one).

A local attacker can therefore trigger an interruption with an
exception on FreeBSD, in order to escalate his privileges or to
trigger a denial of service.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/FreeBSD-privilege-escalation-via-IRET-17749


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts