First published: Tue Dec 04 2018(Updated: )
In FreeBSD before 11.2-STABLE(r341486) and 11.2-RELEASE-p6, insufficient bounds checking in one of the device models provided by bhyve can permit a guest operating system to overwrite memory in the bhyve host possibly permitting arbitrary code execution. A guest OS using a firmware image can cause the bhyve process to crash, or possibly execute arbitrary code on the host as root.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <11.2 | |
FreeBSD Kernel | =11.2-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17160 is categorized as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2018-17160, upgrade to FreeBSD 11.2-STABLE(r341486) or 11.2-RELEASE-p6 or later versions.
CVE-2018-17160 allows a guest OS to overwrite memory on the bhyve host, potentially compromising the host's security.
CVE-2018-17160 affects FreeBSD versions prior to 11.2-STABLE(r341486) and specifically 11.2-RELEASE-p5.
Bhyve is a hypervisor built into FreeBSD which is affected by this vulnerability due to insufficient bounds checking.