CVE-2012-0217

FreeBSD Intel SYSRET Privilege Escalation

Title source: metasploit

Description

The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Shahriyar Jalayeri · textlocalwindows_x86-64
https://www.exploit-db.com/exploits/20861
exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalfreebsd_x86-64
https://www.exploit-db.com/exploits/46508
metasploit WORKING POC GREAT
by Rafal Wojtczuk, John Baldwin, iZsh, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/freebsd/local/intel_sysret_priv_esc.rb
exploitdb WORKING POC VERIFIED
by CurcolHekerLink · clocalfreebsd
https://www.exploit-db.com/exploits/28718

References (23)

... and 3 more

Scores

EPSS 0.8800
EPSS Percentile 99.5%

Classification

CWE
CWE-119
Status draft

Affected Products (20)

xen/xen
xen/xen
freebsd/freebsd < 9.0
illumos/illumos < r13723
joyent/smartos < 20120614
xen/xen < 4.1.2
xen/xen
xen/xen
xen/xen
xen/xen
xen/xen
microsoft/windows_7
microsoft/windows_7
microsoft/windows_server_2003
microsoft/windows_server_2008
... and 5 more

Timeline

Published Jun 12, 2012
Tracked Since Feb 18, 2026