Essential Ping Vulnerability Permits Distant Attackers to Take Over FreeBSD Programs

Dec 05, 2022Ravie LakshmananEndpoint Safety / Pen Testing

FreeBSD Systems

The maintainers of the FreeBSD working system have launched updates to remediate a safety vulnerability impacting the ping module that may very well be doubtlessly exploited to crash this system or set off distant code execution.

The problem, assigned the identifier CVE-2022-23093, impacts all supported variations of FreeBSD and issues a stack-based buffer overflow vulnerability within the ping service.

“ping reads uncooked IP packets from the community to course of responses within the pr_pack() perform,” in response to an advisory printed final week.

“The pr_pack() copies acquired IP and ICMP headers into stack buffers for additional processing. In so doing, it fails to keep in mind the doable presence of IP possibility headers following the IP header in both the response or the quoted packet.”

As a consequence, the vacation spot buffer may very well be overflowed by as much as 40 bytes when the IP possibility headers are current.

The FreeBSD Venture famous that the ping course of runs in a functionality mode sandbox and is subsequently constrained in the way it can work together with the remainder of the working system.

OPNsense, an open supply, FreeBSD-based firewall and routing software program, has additionally launched a patch (model 22.7.9) to plug the safety gap, together with different points.

The findings come as researchers from Qualys detailed one other new vulnerability within the snap-confine program within the Linux working system, constructing upon a earlier privilege escalation flaw (CVE-2021-44731) that got here to gentle in February 2022.

Uncover the Newest Malware Evasion Ways and Prevention Methods

Able to bust the 9 most harmful myths about file-based assaults? Be part of our upcoming webinar and turn out to be a hero within the struggle towards affected person zero infections and zero-day safety occasions!


Snaps are self-contained software packages that may be distributed by upstream builders to customers.

The brand new shortcoming (CVE-2022-3328), launched as a part of a patch for CVE-2021-44731, could be chained with two different flaws in multipathd known as Leeloo Multipath – an authorization bypass and a symlink assault tracked as CVE-2022-41974 and CVE-2022-41973 – to realize root privileges.

Because the multipathd daemon runs by default as root, a profitable exploitation of the issues might allow an unprivileged risk actor to acquire the very best permissions on the susceptible host and execute arbitrary code.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.

Supply By

Related posts