Kernel Use-After-Free Vulnerability Allows Code Execution
CVE-2024-45063

8.8HIGH

Key Information:

Vendor

FreeBSD

Status
Vendor
CVE Published:
5 September 2024

What is CVE-2024-45063?

A flaw in the FreeBSD kernel related to the bhyve virtualization platform has been identified, where the ctl_write_buffer function mishandles flag settings. This misconfiguration leads to a Use-After-Free condition, which can be exploited by malicious software running in a guest virtual machine that utilizes virtio_scsi. By leveraging this vulnerability, an attacker could execute arbitrary code in the bhyve userspace process, which operates with elevated privileges typical to root. While bhyve functions within a Capsicum sandbox, which limits the capabilities available to the process, the risks associated with potential remote code execution on the iSCSI target host remain significant, especially when initiated by a malevolent iSCSI initiator.

Affected Version(s)

FreeBSD 14.1-RELEASE

FreeBSD 14.0-RELEASE

FreeBSD 13.3-RELEASE

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Synacktiv
The FreeBSD Foundation
The Alpha-Omega Project
.