First published: Tue Oct 18 2011(Updated: )
Buffer overflow in the kernel in FreeBSD 7.3 through 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =7.4 | |
FreeBSD FreeBSD | =9.0-beta1 | |
FreeBSD FreeBSD | =8.2 | |
FreeBSD FreeBSD | =9.0-beta3 | |
FreeBSD FreeBSD | =7.3 | |
FreeBSD FreeBSD | =8.1 | |
FreeBSD FreeBSD | =9.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4062 is classified as a high severity vulnerability due to its potential to cause denial of service or privilege escalation.
To mitigate CVE-2011-4062, update the FreeBSD systems to a patched version or apply the recommended security patches.
CVE-2011-4062 affects local users of FreeBSD versions 7.3 through 9.0-RC1.
CVE-2011-4062 can lead to a denial of service condition or potentially allow local privilege escalation through a crafted bind system call.
The impacted FreeBSD versions include 7.3, 7.4, 8.1, 8.2, and beta versions of 9.0.