CVE-2008-3890

Current Description

The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.

Basic Data

PublishedSeptember 05, 2008
Last ModifiedAugust 08, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSFreebsdFreebsd6.3*******
      2.3OSFreebsdFreebsd7.0*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareAmdAmd64********

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 6.3, 7.0

References

NameSourceURLTags
31743http://secunia.com/advisories/31743SECUNIAVendor Advisory
FreeBSD-SA-08:07http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.ascFREEBSD
31003http://www.securityfocus.com/bid/31003BID
1020815http://www.securitytracker.com/id?1020815SECTRACK
freebsd-fault-privilege-escalation(44905)https://exchange.xforce.ibmcloud.com/vulnerabilities/44905XF