CVE-2020-25584

Published on: 04/07/2021 12:00:00 AM UTC

Last Modified on: 04/16/2021 01:08:00 PM UTC

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

Certain versions of Freebsd from Freebsd contain the following vulnerability:

In FreeBSD 13.0-STABLE before n245118, 12.2-STABLE before r369552, 11.4-STABLE before r369560, 13.0-RC5 before p1, 12.2-RELEASE before p6, and 11.4-RELEASE before p9, a superuser inside a FreeBSD jail configured with the non-default allow.mount permission could cause a race condition between the lookup of ".." and remounting a filesystem, allowing access to filesystem hierarchy outside of the jail.

  • CVE-2020-25584 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL HIGH HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED HIGH HIGH HIGH

CVSS2 Score: 6.2 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL HIGH NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
security.FreeBSD.org
text/plain
MISC security.FreeBSD.org/advisories/FreeBSD-SA-21:10.jail_mount.asc

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
FreebsdFreebsdAllAllAllAll
Operating
System
FreebsdFreebsd11.4-AllAll
Operating
System
FreebsdFreebsd11.4beta1AllAll
Operating
System
FreebsdFreebsd11.4p1AllAll
Operating
System
FreebsdFreebsd11.4p2AllAll
Operating
System
FreebsdFreebsd11.4p3AllAll
Operating
System
FreebsdFreebsd11.4p4AllAll
Operating
System
FreebsdFreebsd11.4p5AllAll
Operating
System
FreebsdFreebsd11.4rc1AllAll
Operating
System
FreebsdFreebsd11.4rc2AllAll
Operating
System
FreebsdFreebsd12.2-AllAll
Operating
System
FreebsdFreebsd12.2p1AllAll
Operating
System
FreebsdFreebsd12.2p2AllAll
Operating
System
FreebsdFreebsd13.0beta1AllAll
Operating
System
FreebsdFreebsd13.0beta2AllAll
Operating
System
FreebsdFreebsd13.0beta3AllAll
Operating
System
FreebsdFreebsd13.0beta4AllAll
Operating
System
FreebsdFreebsd13.0rc1AllAll
Operating
System
FreebsdFreebsd13.0rc2AllAll
Operating
System
FreebsdFreebsd13.0rc3AllAll
Operating
System
FreebsdFreebsd13.0rc4AllAll
Operating
System
FreebsdFreebsd13.0rc5AllAll
  • cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:p5:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:beta4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc1:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc2:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc3:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc4:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:13.0:rc5:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2020-25584 : In FreeBSD 13.0-STABLE before n245118, 12.2-STABLE before r369552, 11.4-STABLE before r369560, 13.… twitter.com/i/web/status/1… 2021-04-07 15:02:42
Twitter Icon @LinInfoSec Freebsd - CVE-2020-25584: security.FreeBSD.org/advisories/Fre… 2021-04-07 22:28:53