摘要:
This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
安全等级: Low
公告ID: KylinSec-SA-2023-1120
发布日期: 2023年3月1日
关联CVE: CVE-2021-35000
This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-35000 | KY3.4-4A | kernel | Unaffected |
CVE-2021-35000 | KY3.4-5A | kernel | Unaffected |
CVE-2021-35000 | KY3.5.1 | kernel | Unaffected |