#VU124681 Stack-based buffer overflow in FreeBSD - CVE-2026-4747

 

#VU124681 Stack-based buffer overflow in FreeBSD - CVE-2026-4747

Published: March 30, 2026


Vulnerability identifier: #VU124681
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2026-4747
CWE-ID: CWE-121
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
FreeBSD
Software vendor:
FreeBSD Foundation

Description

The vulnerability allows a remote attacker to execute arbitrary code in the kernel or in userspace RPC servers.

The vulnerability exists due to improper input validation in the RPCSEC_GSS packet validation routine when handling RPC packets. A remote attacker can send a specially crafted RPC packet to trigger a stack overflow, leading to arbitrary code execution.

The kernel component kgssapi.ko is vulnerable when loaded, and userspace applications linked with librpcsec_gss that run an RPC server are also vulnerable. 


Remediation

Install security update from vendor's website.

External links