lib9p Handle RWALK Messages Without Bounds Check, Leading to Memory Overwrite and Potential Code Execution
CVE-2022-23092
8.8HIGH
What is CVE-2022-23092?
A vulnerability within the lib9p implementation in FreeBSD relates to the mishandling of RWALK messages, specifically due to a lack of a crucial bounds check. This flaw allows attackers to send specially crafted messages that can lead to memory being overwritten. Once exploited, a malicious bhyve guest kernel can trigger this bug, resulting in the potential execution of user-mode code within the bhyve process. This poses significant security risks since it operates within bhyve's Capsicum sandbox, potentially compromising system integrity.
Affected Version(s)
FreeBSD 13.1-RELEASE
FreeBSD 13.0-RELEASE
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Robert Morris