8.8

CVE-2024-42416

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory.

Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root.  Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process.  A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FreebsdFreebsd Version >= 13.0 < 13.3
FreebsdFreebsd Version13.3 Update-
FreebsdFreebsd Version13.3 Updatep1
FreebsdFreebsd Version13.3 Updatep2
FreebsdFreebsd Version13.3 Updatep3
FreebsdFreebsd Version13.3 Updatep4
FreebsdFreebsd Version13.3 Updatep5
FreebsdFreebsd Version13.4 Updatebeta3
FreebsdFreebsd Version14.0 Update-
FreebsdFreebsd Version14.0 Updatebeta5
FreebsdFreebsd Version14.0 Updatep1
FreebsdFreebsd Version14.0 Updatep2
FreebsdFreebsd Version14.0 Updatep3
FreebsdFreebsd Version14.0 Updatep4
FreebsdFreebsd Version14.0 Updatep5
FreebsdFreebsd Version14.0 Updatep6
FreebsdFreebsd Version14.0 Updatep7
FreebsdFreebsd Version14.0 Updatep8
FreebsdFreebsd Version14.0 Updatep9
FreebsdFreebsd Version14.0 Updaterc3
FreebsdFreebsd Version14.0 Updaterc4-p1
FreebsdFreebsd Version14.1 Update-
FreebsdFreebsd Version14.1 Updatep1
FreebsdFreebsd Version14.1 Updatep2
FreebsdFreebsd Version14.1 Updatep3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.16% 0.377
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2 6
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.4 2.5 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-1284 Improper Validation of Specified Quantity in Input

The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.

CWE-790 Improper Filtering of Special Elements

The product receives data from an upstream component, but does not filter or incorrectly filters special elements before sending it to a downstream component.

CWE-823 Use of Out-of-range Pointer Offset

The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended range of valid memory locations for the resulting pointer.