lib9p Handle RWALK Messages Without Bounds Check, Leading to Memory Overwrite and Potential Code Execution
CVE-2022-23092

8.8HIGH

Key Information:

Vendor

FreeBSD

Status
Vendor
CVE Published:
15 February 2024

What is CVE-2022-23092?

A vulnerability within the lib9p implementation in FreeBSD relates to the mishandling of RWALK messages, specifically due to a lack of a crucial bounds check. This flaw allows attackers to send specially crafted messages that can lead to memory being overwritten. Once exploited, a malicious bhyve guest kernel can trigger this bug, resulting in the potential execution of user-mode code within the bhyve process. This poses significant security risks since it operates within bhyve's Capsicum sandbox, potentially compromising system integrity.

Affected Version(s)

FreeBSD 13.1-RELEASE

FreeBSD 13.0-RELEASE

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Robert Morris
.