First published: Wed Jan 16 2008(Updated: )
The ptsname function in FreeBSD 6.0 through 7.0-PRERELEASE does not properly verify that a certain portion of a device name is associated with a pty of a user who is calling the pt_chown function, which might allow local users to read data from the pty from another user.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.0-release | |
FreeBSD Kernel | =6.0-stable | |
FreeBSD Kernel | =6.1 | |
FreeBSD Kernel | =6.1-release | |
FreeBSD Kernel | =6.1-release_p10 | |
FreeBSD Kernel | =6.1-stable | |
FreeBSD Kernel | =6.2 | |
FreeBSD Kernel | =6.2-stable | |
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =7.0 | |
FreeBSD Kernel | =7.0-current | |
FreeBSD Kernel | =7.0-pre-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0216 is classified as a moderate severity vulnerability.
To fix CVE-2008-0216, you should update your FreeBSD system to a version that has addressed this vulnerability.
CVE-2008-0216 affects local users of FreeBSD versions 6.0 through 7.0-PRERELEASE.
CVE-2008-0216 is a local privilege escalation vulnerability in the ptsname function.
No, CVE-2008-0216 can only be exploited by local users on affected FreeBSD systems.