CVE-2020-7457
HIGHFreeBSD ip6_setpktopt Use-After-Free Privilege Escalation
Title source: metasploitDescription
In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.
Exploits (1)
metasploit
WORKING POC
GREAT
by Andy Nguyen, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/freebsd/local/ip6_setpktopt_uaf_priv_esc.rb
References (3)
Scores
CVSS v3
8.1
EPSS
0.4458
EPSS Percentile
97.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-662
CWE-362
CWE-416
Status
published
Products (3)
freebsd/freebsd
11.3 (11 CPE variants)
freebsd/freebsd
11.4 (3 CPE variants)
freebsd/freebsd
12.1 (7 CPE variants)
Published
Jul 09, 2020
Tracked Since
Feb 18, 2026