Vulnerabilities > CVE-2004-0126 - Unspecified vulnerability in Freebsd 5.1/5.2/5.2.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN freebsd
nessus
Summary
The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/write privileges to files and directories within another jail.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_JAILED_PROCESSES.NASL |
description | The remote host is running a version of the FreeBSD kernel which contains a bug which may allow a jailed process to attach to another jail. An attacker compromised a jailed process on the remote host could exploit this flaw to switch to other jails on the system. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12556 |
published | 2004-07-06 |
reporter | This script is Copyright (C) 2004-2010 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12556 |
title | FreeBSD : SA-04:03.jail |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc
- http://www.osvdb.org/4101
- http://www.osvdb.org/4101
- http://www.securityfocus.com/bid/9762
- http://www.securityfocus.com/bid/9762
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15344
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15344