SB2024080831 - Multiple vulnerabilities in FreeBSD



SB2024080831 - Multiple vulnerabilities in FreeBSD

Published: August 8, 2024

Security Bulletin ID SB2024080831
Severity
Critical
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 25% Medium 25% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2024-7589)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to a race condition when calling a not async-signal-safe in openssh. A remote non-authenticated attacker can send specially crafted packets to the system, trigger a race condition and execute arbitrary code as root.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-6760)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a logic error in the ktrace unility, which failed to detach when executing a setuid binary. A local user can gain access to sensitive information.


3) State Issues (CVE-ID: CVE-2024-6640)

The vulnerability allows a remote attacker to bypass pf rules.

The vulnerability exists due to improper handling of ICMPv6 packets with ID=0. If the firewall is configured to block incoming Echo requests, this rule can be bypass by sending an ICMPv6 packet with identifier value of zero.


4) Path traversal (CVE-ID: CVE-2024-6759)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing file names with path separator character (e.g. "/"). A remote user can trick the application to read or write data outside of the NFS mount.


Remediation

Install update from vendor's website.