Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
References
| Link | Resource |
|---|---|
| https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom | Exploit Third Party Advisory |
| https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 | Patch Third Party Advisory |
Configurations
Information
Published : 2019-12-31 03:15
Updated : 2020-08-24 17:37
NVD link : CVE-2019-20172
Mitre link : CVE-2019-20172
JSON object : View
Products Affected
serenityos
- serenity
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
