First published: Tue Jul 13 2010(Updated: )
FreeBSD 7.1 through 8.1-PRERELEASE does not copy the read-only flag when creating a duplicate mbuf buffer reference, which allows local users to cause a denial of service (system file corruption) and gain privileges via the sendfile system call.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =7.1 | |
FreeBSD Kernel | =7.1-pre-release | |
FreeBSD Kernel | =7.1-rc1 | |
FreeBSD Kernel | =7.1-release-p1 | |
FreeBSD Kernel | =7.1-release-p2 | |
FreeBSD Kernel | =7.1-release-p4 | |
FreeBSD Kernel | =7.1-release-p5 | |
FreeBSD Kernel | =7.1-release-p6 | |
FreeBSD Kernel | =7.2 | |
FreeBSD Kernel | =7.2-pre-release | |
FreeBSD Kernel | =7.2-stable | |
FreeBSD Kernel | =7.3 | |
FreeBSD Kernel | =8.0 | |
FreeBSD Kernel | =8.1-pre-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2693 is classified as a medium severity vulnerability due to its potential to cause denial of service and privilege escalation.
To fix CVE-2010-2693, upgrade to a patched version of FreeBSD that addresses this vulnerability.
CVE-2010-2693 affects FreeBSD versions 7.1 through 8.1-PRERELEASE.
CVE-2010-2693 can facilitate local denial of service attacks and privilege escalation through the sendfile system call.
As of now, there is no publicly available exploit specific to CVE-2010-2693, but the vulnerability poses significant risk.