CVE-2008-5736
Published Dec 26, 2008
Last updated 5 years ago
Overview
- Description
- Multiple unspecified vulnerabilities in FreeBSD 6 before 6.4-STABLE, 6.3 before 6.3-RELEASE-p7, 6.4 before 6.4-RELEASE-p1, 7.0 before 7.0-RELEASE-p7, 7.1 before 7.1-RC2, and 7 before 7.1-PRERELEASE allow local users to gain privileges via unknown attack vectors related to function pointers that are "not properly initialized" for (1) netgraph sockets and (2) bluetooth sockets.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Evaluator
- Comment
- -
- Impact
- -
- Solution
- -
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:6.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F587A367-E975-4A38-BBC3-AF3194F1E296" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB6FC258-9735-4199-9499-ACFCEF30EE5E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA825CA5-84B6-4DA4-9F7F-644E532185A8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90B64FDC-01C0-4A83-827D-31F477C0359B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5666E87-F0CB-45FA-9AED-C7A0F383A559" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6032AC16-C610-4D19-96A2-FA5233FC56B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:6.4:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0F3E8EE-7DA6-4A92-8A73-4785205E4BF6" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EA45D5C-199D-44A1-90B1-1157F899A01A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06C1FB6A-E829-4FF3-B206-8877C9747DB2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3A3BF88-7014-440D-8AC2-FB42A779F489" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "777E9236-AD46-484F-BC22-7F74AB6261F0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D308A1E-5364-483D-AB82-8269D576CEE8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0BD460B-45CC-48DF-853D-E6BF7A7BEDFE" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93078B0C-2CA2-4A9C-A740-9947074F837C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52DBF406-9C77-4DDA-AB7D-40FAE40023D0" } ], "operator": "OR" } ] } ]