FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
Posted by deepcore on August 2, 2020 – 2:58 am
This Metasploit module exploits a race and use-after-free vulnerability in the FreeBSD kernel IPv6 socket handling. A missing synchronization lock in the IPV6_2292PKTOPTIONS option handling in setsockopt permits racing ip6_setpktopt access to a freed ip6_pktopts struct. This exploit overwrites the ip6po_pktinfo pointer of a ip6_pktopts struct in freed memory to achieve arbitrary kernel read/write.
Post a reply
You must be logged in to post a comment.