The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
2024-09-05T05:15:13.600
2024-09-05T21:25:09.273
Analyzed
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | freebsd | freebsd | < 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.3 | Yes |
Operating System | freebsd | freebsd | 13.4 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.0 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |
Operating System | freebsd | freebsd | 14.1 | Yes |