FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
https://packetstormsecurity.com/files/158695/ip6_setpktopt_uaf_priv_esc.rb.txt
https://packetstormsecurity.com/files/158695/ip6_setpktopt_uaf_priv_esc.rb.txthttps://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.htmlFri, 31 Jul 2020 19:49:06 GMTThis Metasploit module exploits a race and use-after-free vulnerability in the FreeBSD kernel IPv6 socket handling. A missing synchronization lock in the IPV6_2292PKTOPTIONS option handling in setsockopt permits racing ip6_setpktopt access to a freed ip6_pktopts struct. This exploit overwrites the ip6po_pktinfo pointer of a ip6_pktopts struct in freed memory to achieve arbitrary kernel read/write.