CVE-2004-0125

Current Description

The jail system call in FreeBSD 4.x before 4.10-RELEASE does not verify that an attempt to manipulate routing tables originated from a non-jailed process, which could allow local users to modify the routing table.

Basic Data

PublishedAugust 06, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSFreebsdFreebsd4.0*******
    2.3OSFreebsdFreebsd4.0alpha******
    2.3OSFreebsdFreebsd4.0releng******
    2.3OSFreebsdFreebsd4.1*******
    2.3OSFreebsdFreebsd4.1.1*******
    2.3OSFreebsdFreebsd4.1.1release******
    2.3OSFreebsdFreebsd4.1.1stable******
    2.3OSFreebsdFreebsd4.2*******
    2.3OSFreebsdFreebsd4.2stable******
    2.3OSFreebsdFreebsd4.3*******
    2.3OSFreebsdFreebsd4.3release******
    2.3OSFreebsdFreebsd4.3release_p38******
    2.3OSFreebsdFreebsd4.3releng******
    2.3OSFreebsdFreebsd4.3stable******
    2.3OSFreebsdFreebsd4.4*******
    2.3OSFreebsdFreebsd4.4release_p42******
    2.3OSFreebsdFreebsd4.4releng******
    2.3OSFreebsdFreebsd4.4stable******
    2.3OSFreebsdFreebsd4.5*******
    2.3OSFreebsdFreebsd4.5release******
    2.3OSFreebsdFreebsd4.5release_p32******
    2.3OSFreebsdFreebsd4.5releng******
    2.3OSFreebsdFreebsd4.5stable******
    2.3OSFreebsdFreebsd4.6*******
    2.3OSFreebsdFreebsd4.6release******
    2.3OSFreebsdFreebsd4.6release_p20******
    2.3OSFreebsdFreebsd4.6releng******
    2.3OSFreebsdFreebsd4.6stable******
    2.3OSFreebsdFreebsd4.6.2*******
    2.3OSFreebsdFreebsd4.7*******
    2.3OSFreebsdFreebsd4.7release******
    2.3OSFreebsdFreebsd4.7release_p17******
    2.3OSFreebsdFreebsd4.7releng******
    2.3OSFreebsdFreebsd4.7stable******
    2.3OSFreebsdFreebsd4.8*******
    2.3OSFreebsdFreebsd4.8pre-release******
    2.3OSFreebsdFreebsd4.8release_p6******
    2.3OSFreebsdFreebsd4.8releng******
    2.3OSFreebsdFreebsd4.9*******
    2.3OSFreebsdFreebsd4.9pre-release******
    2.3OSFreebsdFreebsd4.9releng******
    2.3OSFreebsdFreebsd4.10*******

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 4.0, 4.1, 4.1.1, 4.10, 4.2, 4.3, 4.4, 4.5, 4.6, 4.6.2, 4.7, 4.8, 4.9

References

NameSourceURLTags
FreeBSD-SA-04:12ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:12.jailroute.ascFREEBSD
10485http://www.securityfocus.com/bid/10485BIDPATCH Vendor Advisory
freebsd-jailed-table-modify(16342)https://exchange.xforce.ibmcloud.com/vulnerabilities/16342XF