Vulnerability Details : CVE-2013-2171
Public exploit exists!
The vm_map_lookup function in sys/vm/vm_map.c in the mmap implementation in the kernel in FreeBSD 9.0 through 9.1-RELEASE-p4 does not properly determine whether a task should have write access to a memory location, which allows local users to bypass filesystem write permissions and consequently gain privileges via a crafted application that leverages read permissions, and makes mmap and ptrace system calls.
Exploit prediction scoring system (EPSS) score for CVE-2013-2171
Probability of exploitation activity in the next 30 days: 0.42%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 74 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-2171
-
FreeBSD 9 Address Space Manipulation Privilege Escalation
Disclosure Date: 2013-06-18First seen: 2020-04-26exploit/freebsd/local/mmapThis module exploits a vulnerability that can be used to modify portions of a process's address space, which may lead to privilege escalation. Systems such as FreeBSD 9.0 and 9.1 are known to be vulnerable. Authors: - Konstantin Belousov - Alan Cox - Hu
CVSS scores for CVE-2013-2171
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2013-2171
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2171
-
http://www.freebsd.org/security/advisories/FreeBSD-SA-13:06.mmap.asc
Vendor Advisory
-
http://www.debian.org/security/2013/dsa-2714
Debian -- Security Information -- DSA-2714-1 kfreebsd-9
-
http://svnweb.freebsd.org/base?view=revision&revision=251901
[base] Revision 251901
Products affected by CVE-2013-2171
- cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*