Privilege Escalation Affecting freebsd package, versions [,525916_2020-02-12)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Privilege Escalation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FREEBSD-2382878
  • published26 Jan 2022
  • disclosed14 Mar 2020
  • creditUnknown

Introduced: 14 Mar 2020

CVE-2020-10565  (opens in a new tab)
CWE-269  (opens in a new tab)

How to fix?

Upgrade freebsd to version 525916_2020-02-12 or higher.

Overview

Affected versions of this package are vulnerable to Privilege Escalation grub2-bhyve, as used in FreeBSD bhyve before revision 525916 2020-02-12, does not validate the address provided as part of a memrw command (read_* or write_*) by a guest through a grub2.cfg file. This allows an untrusted guest to perform arbitrary read or write operations in the context of the grub-bhyve process, resulting in code execution as root on the host OS.

References

CVSS Scores

version 3.1