First published: Wed Aug 28 2013(Updated: )
Multiple integer overflows in the IP_MSFILTER and IPV6_MSFILTER features in (1) sys/netinet/in_mcast.c and (2) sys/netinet6/in6_mcast.c in the multicast implementation in the kernel in FreeBSD 8.3 through 9.2-PRERELEASE allow local users to bypass intended restrictions on kernel-memory read and write operations, and consequently gain privileges, via vectors involving a large number of source-filter entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =8.3 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.1-p4 | |
FreeBSD Kernel | =9.1-p5 | |
FreeBSD Kernel | =9.2-prerelease |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3077 has a high severity rating due to the potential for local users to bypass kernel memory access restrictions.
To fix CVE-2013-3077, upgrade your FreeBSD system to a patched version beyond 9.2-PRERELEASE.
CVE-2013-3077 affects FreeBSD versions 8.3 up to 9.2-PRERELEASE.
The impacts of CVE-2013-3077 may include unauthorized access to kernel memory which can lead to data breaches.
No, CVE-2013-3077 is a local vulnerability that requires authenticated local access to exploit.