First published: Tue Oct 06 2009(Updated: )
Race condition in the Pipe (IPC) close function in FreeBSD 6.3 and 6.4 allows local users to cause a denial of service (crash) or gain privileges via vectors related to kqueues, which triggers a use after free, leading to a NULL pointer dereference or memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3527 is classified as a high severity vulnerability due to its potential to cause denial of service (crash) and privilege escalation.
To fix CVE-2009-3527, upgrade your FreeBSD system to version 6.4 or later, which contains patches for this vulnerability.
CVE-2009-3527 affects local users of FreeBSD versions 6.3 and 6.4.
CVE-2009-3527 can lead to a denial of service attack or privilege escalation via a race condition in the Pipe close function.
The potential impacts of CVE-2009-3527 include system crashes and unauthorized access to system privileges due to memory corruption.