The ctl_write_buffer and ctl_read_buffer functions allocated memory to be returned to userspace, without initializing it. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve userspace process, which typically runs as root. Note that bhyve runs in a Capsicum sandbox, so malicious code is constrained by the capabilities available to the bhyve process. A malicious iSCSI initiator could achieve remote code execution on the iSCSI target host.
2024-09-05T05:15:13.907
2024-09-06T17:35:20.203
Modified
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | freebsd | freebsd | < 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.3 | Yes |
| Operating System | freebsd | freebsd | 13.4 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.0 | Yes |
| Operating System | freebsd | freebsd | 14.1 | Yes |
| Operating System | freebsd | freebsd | 14.1 | Yes |
| Operating System | freebsd | freebsd | 14.1 | Yes |
| Operating System | freebsd | freebsd | 14.1 | Yes |