• 公告ID (KylinSec-SA-2023-1120)

摘要:

This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.

安全等级: Low

公告ID: KylinSec-SA-2023-1120

发布日期: 2023年3月1日

关联CVE: CVE-2021-35000  

  • 详细介绍

1. 漏洞描述

   

This vulnerability allows local attackers to disclose sensitive information on affected installations of OpenBSD Kernel. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the implementation of multicast routing. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2021-35000 KY3.4-4A kernel Unaffected
CVE-2021-35000 KY3.4-5A kernel Unaffected
CVE-2021-35000 KY3.5.1 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2023-1119 下一篇:KylinSec-SA-2023-1121