CVE-2020-7457

HIGH

FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation

Title source: metasploit
STIX 2.1

Description

In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.

Exploits (1)

metasploit WORKING POC GREAT
by Andy Nguyen, bcoles · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/freebsd/local/ip6_setpktopt_uaf_priv_esc.rb

Scores

CVSS v3 8.1
EPSS 0.4458
EPSS Percentile 97.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-662 CWE-362 CWE-416
Status published
Products (3)
freebsd/freebsd 11.3 (11 CPE variants)
freebsd/freebsd 11.4 (3 CPE variants)
freebsd/freebsd 12.1 (7 CPE variants)
Published Jul 09, 2020
Tracked Since Feb 18, 2026