Overview
There are a set of kernel interfaces called "call gates" which are code primitives used to build system-level calls into an operating system's kernel. A subset of these "calls gates" may be able to be manipulated on some operating systems which use improper privilege checking when accessing local descriptor tables (LDTs)
Description
Of specific concern is the syscall "i386_set_ldt" , which accesses a call gate without first validating whether a ring transition to a more privileged segment in the LDT is appropriate. Of special note is an observation shared in the NetBSD security advisory on this issue: |
Impact
A user with access to a local account may gain privileges reserved for the kernel. |
Solution
Apply kernel patches provided by your vendor. |
The fix to NetBSD [for example]: Index: i386/sys_machdep.c |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This was initially reported by Bill Sommerfeld.
This document was written by Jeff S Havrilla
Other Information
CVE IDs: | None |
Severity Metric: | 7.13 |
Date Public: | 2001-02-16 |
Date First Published: | 2001-02-16 |
Date Last Updated: | 2001-03-02 22:12 UTC |
Document Revision: | 7 |