| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.9 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in NetBSD 1.x. The impacted element is the function swapctl. Performing a manipulation results in denial of service.
The attack can only be performed from the local network. Additionally, an exploit exists.
It is recommended to apply a patch to fix this issue.
Details
A vulnerability classified as problematic has been found in NetBSD 1.x (Operating System). This affects the function swapctl. The manipulation with an unknown input leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability.
The weakness was released 06/11/2004 by Evgeny Demidov with GLEG Ltd. as confirmed posting (Bugtraq). It is possible to read the advisory at securityfocus.com. The attack needs to be initiated within the local network. No form of authentication is needed for exploitation. Technical details and a public exploit are known.
After 1 days, there has been an exploit disclosed. It is declared as proof-of-concept.
Applying a patch is able to eliminate this problem. The bugfix is ready for download at cvsweb.netbsd.org.
The vulnerability is also documented in the databases at X-Force (16393), SecurityFocus (BID 10529†), OSVDB (6950†) and Secunia (SA11847†). Further details are available at netbsd.org. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 5.9
VulDB Base Score: 6.5
VulDB Temp Score: 5.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Partially
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Patch: cvsweb.netbsd.org
Timeline
06/11/2004 🔍06/11/2004 🔍
06/12/2004 🔍
06/12/2004 🔍
06/15/2004 🔍
06/28/2019 🔍
Sources
Advisory: securityfocus.com⛔Researcher: Evgeny Demidov
Organization: GLEG Ltd.
Status: Confirmed
GCVE (VulDB): GCVE-100-711
X-Force: 16393 - NetBSD swapctl denial of service, Medium Risk
SecurityFocus: 10529 - NetBSD Swapctl() Local Denial Of Service Vulnerability
Secunia: 11847 - NetBSD "swapctl()" Denial of Service Vulnerability, Not Critical
OSVDB: 6950 - NetBSD swapctl Integer Handling Local DoS
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 06/15/2004 12:10Updated: 06/28/2019 17:25
Changes: 06/15/2004 12:10 (67), 06/28/2019 17:25 (2)
Complete: 🔍
Cache ID: 216:7E0:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.