First published: Thu Jul 09 2020(Updated: )
In FreeBSD 12.1-STABLE before r362281, 11.4-STABLE before r362281, and 11.4-RELEASE before p1, long values in the user-controlled PATH environment variable cause posix_spawnp to write beyond the end of the heap allocated stack possibly leading to arbitrary code execution.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =11.4 | |
FreeBSD FreeBSD | =11.4-beta1 | |
FreeBSD FreeBSD | =12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-7458 is critical with a CVSS score of 9.8.
The affected software for CVE-2020-7458 is FreeBSD versions 11.4 and 12.1.
CVE-2020-7458 in FreeBSD can allow an attacker to execute arbitrary code by exploiting a stack-based buffer overflow in posix_spawnp.
Yes, patches and updates are available for CVE-2020-7458 from the FreeBSD project.
More information about CVE-2020-7458 can be found in the FreeBSD-SA-20:18 advisory.