| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 2.8 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic has been found in FreeBSD up to 4.5. This vulnerability affects the function fstatfs of the component procfs. The manipulation leads to denial of service.
This vulnerability is traded as CVE-2002-1674. There is no exploit available.
It is recommended to upgrade the affected component.
Details
A vulnerability was found in FreeBSD up to 4.5 (Operating System) and classified as problematic. This issue affects the function fstatfs of the component procfs. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability. The summary by CVE is:
procfs on FreeBSD before 4.5 allows local users to cause a denial of service (kernel panic) by removing a file that the fstatfs function refers to.
The bug was discovered 02/06/2002. The weakness was shared 12/31/2002 by Stefan Esser (Website). It is possible to read the advisory at xforce.iss.net. The identification of this vulnerability is CVE-2002-1674 since 06/21/2005. The exploitation is known to be difficult. Attacking locally is a requirement. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit.
The vulnerability was handled as a non-public zero-day exploit for at least 328 days. During that time the estimated underground price was around $5k-$25k.
Upgrading to version 4.5 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (8112), SecurityFocus (BID 4040†), OSVDB (21359†) and Vulnerability Center (SBV-22687†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
Version
License
Website
- Product: https://www.freebsd.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 2.9VulDB Meta Temp Score: 2.8
VulDB Base Score: 2.9
VulDB Temp Score: 2.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: FreeBSD 4.5
Timeline
02/06/2002 🔍02/06/2002 🔍
02/06/2002 🔍
12/31/2002 🔍
12/31/2002 🔍
06/21/2005 🔍
06/25/2009 🔍
08/04/2014 🔍
09/06/2019 🔍
Sources
Product: freebsd.orgAdvisory: xforce.iss.net
Researcher: Stefan Esser
Status: Not defined
CVE: CVE-2002-1674 (🔍)
GCVE (CVE): GCVE-0-2002-1674
GCVE (VulDB): GCVE-100-19319
X-Force: 8112
SecurityFocus: 4040 - FreeBSD FStatFS Syscall Race Condition Vulnerability
OSVDB: 21359 - FreeBSD - FStatFS Syscall Race Condition Vulnerabili
Vulnerability Center: 22687 - FreeBSD < 4.5 FStatFS Function Local DoS Vulnerability, Medium
Entry
Created: 08/04/2014 16:24Updated: 09/06/2019 17:00
Changes: 08/04/2014 16:24 (60), 09/06/2019 17:00 (4)
Complete: 🔍
Cache ID: 216:E88:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.