CVE-2020-24863

A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:midnightbsd:midnightbsd:*:*:*:*:*:*:*:*
cpe:2.3:a:midnightbsd:midnightbsd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:16

Type Values Removed Values Added
References () http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:01.txt - Exploit, Vendor Advisory () http://www.midnightbsd.org/security/adv/MIDNIGHTBSD-SA-20:01.txt - Exploit, Vendor Advisory
References () https://github.com/MidnightBSD/src/blob/1691c07ff4f27b97220a5d65e217341e477f4014/sys/kern/vfs_syscalls.c - Exploit, Third Party Advisory () https://github.com/MidnightBSD/src/blob/1691c07ff4f27b97220a5d65e217341e477f4014/sys/kern/vfs_syscalls.c - Exploit, Third Party Advisory
References () https://www.freebsd.org/security/advisories/FreeBSD-EN-20:18.getfsstat.asc - Patch, Vendor Advisory () https://www.freebsd.org/security/advisories/FreeBSD-EN-20:18.getfsstat.asc - Patch, Vendor Advisory
References () https://www.midnightbsd.org/notes/ - Release Notes, Vendor Advisory () https://www.midnightbsd.org/notes/ - Release Notes, Vendor Advisory

Information

Published : 2020-09-03 15:15

Updated : 2024-11-21 05:16


NVD link : CVE-2020-24863

Mitre link : CVE-2020-24863

CVE.ORG link : CVE-2020-24863


JSON object : View

Products Affected

midnightbsd

  • midnightbsd

freebsd

  • freebsd
CWE
CWE-787

Out-of-bounds Write