what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation https://packetstormsecurity.com/files/158695/ip6_setpktopt_uaf_priv_esc.rb.txt https://packetstormsecurity.com/files/158695/ip6_setpktopt_uaf_priv_esc.rb.txt https://packetstormsecurity.com/files/158695/FreeBSD-ip6_setpktopt-Use-After-Free-Privilege-Escalation.html Fri, 31 Jul 2020 19:49:06 GMT This Metasploit module exploits a race and use-after-free vulnerability in the FreeBSD kernel IPv6 socket handling. A missing synchronization lock in the IPV6_2292PKTOPTIONS option handling in setsockopt permits racing ip6_setpktopt access to a freed ip6_pktopts struct. This exploit overwrites the ip6po_pktinfo pointer of a ip6_pktopts struct in freed memory to achieve arbitrary kernel read/write.

Related Files

No related files
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close