First published: Wed Mar 03 2004(Updated: )
The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails, which could allow local users to gain read or write access to a portion of kernel memory and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | <=2.6 | |
FreeBSD FreeBSD | <=5.2 | |
NetBSD NetBSD | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0114 is classified as having a moderate severity level due to the potential for local users to gain unauthorized access to shared memory segments.
To address CVE-2004-0114, consider upgrading to a patched version of FreeBSD, OpenBSD, or NetBSD that resolves the issue.
CVE-2004-0114 affects FreeBSD versions up to 5.2, NetBSD versions up to 1.3, and OpenBSD versions up to 2.6.
The impact of CVE-2004-0114 includes a potential escalation of privileges, allowing local users to read or write to restricted shared memory segments.
While the best solution is upgrading to fixed versions, restricting access permissions for shared memory segments can serve as a temporary workaround for CVE-2004-0114.