Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
References
Link | Resource |
---|---|
https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom | Exploit Third Party Advisory |
https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 | Patch Third Party Advisory |
https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom | Exploit Third Party Advisory |
https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom - Exploit, Third Party Advisory | |
References | () https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 - Patch, Third Party Advisory |
Information
Published : 2019-12-31 03:15
Updated : 2024-11-21 04:38
NVD link : CVE-2019-20172
Mitre link : CVE-2019-20172
CVE.ORG link : CVE-2019-20172
JSON object : View
Products Affected
serenityos
- serenityos
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer