A security researcher found that the FreeBSD operating system has security vulnerabilities that allow users with limited permissions to fully control the entire system.
A Polish security consultant named Przemyslaw Frasunek told the Register team that the Bug exists in FreeBSD's kqueue notification interface and the Bug gives full root privileges. It affects operating systems from version 6.0 to version 6.4. However, versions 7.1 and later are not vulnerable to attacks.
Whether it is a legitimate user or hacker, to exploit the vulnerability, you must first be able to access the system from the local device, which provides attackers with a breakthrough in attacking the system.
Bug makes FreeBSD kqueue messy, and causes the X number operation of the NULL pointer in kernel mode. Attackers can map the code on a memory page to address 0x0 to run malware.
Frasunek said that he sent a notification to FreeBSD on December 31, August 29, but he has not yet received a reply. Robert Watson, FreeBSD's core team member, told Register that the email had been lost and he hoped to get relevant reports as soon as possible.
- FreeBSD 6.x Privilege Escalation Vulnerability
- FreeBSD Root Privilege Escalation Vulnerability
- FreeBSD secure connection mode SSL