Stack-based buffer overflow in sys/kern/vfs_mount.c in the kernel in FreeBSD 7.0 and 7.1, when vfs.usermount is enabled, allows local users to gain privileges via a crafted (1) mount or (2) nmount system call, related to copying of "user defined data" in "certain error conditions."
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/31002 | vdb entry patch |
http://www.securitytracker.com/id?1020816 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45143 | vdb entry |
http://security.FreeBSD.org/advisories/FreeBSD-SA-08:08.nmount.asc | vendor advisory |