First published: Mon Sep 23 2013(Updated: )
The (1) IPv6 and (2) ATM ioctl request handlers in the kernel in FreeBSD 8.3 through 9.2-STABLE do not validate SIOCSIFADDR, SIOCSIFBRDADDR, SIOCSIFDSTADDR, and SIOCSIFNETMASK requests, which allows local users to perform link-layer actions, cause a denial of service (panic), or possibly gain privileges via a crafted application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =8.3 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5691 is classified as a high-severity vulnerability due to its potential to cause denial of service and privilege escalation.
To mitigate CVE-2013-5691, you should upgrade to a patched version of FreeBSD beyond 9.2-STABLE.
CVE-2013-5691 affects FreeBSD versions 8.3, 9.0, 9.1, and 9.2-STABLE.
Local users can exploit CVE-2013-5691 to perform link-layer actions that may lead to system panic.
Yes, CVE-2013-5691 involves improper validation of network ioctl requests related to IPv6 and ATM in the FreeBSD kernel.