Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:freebsd:freebsd:6.0:-:*:*:*:*:*:*", "matchCriteriaId": "F587A367-E975-4A38-BBC3-AF3194F1E296", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:-:*:*:*:*:*:*", "matchCriteriaId": "2D9F4FEB-30E5-4EF6-BEB6-0F1A4DE7EFB9", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p1:*:*:*:*:*:*", "matchCriteriaId": "BB6FC258-9735-4199-9499-ACFCEF30EE5E", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p2:*:*:*:*:*:*", "matchCriteriaId": "BA825CA5-84B6-4DA4-9F7F-644E532185A8", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p3:*:*:*:*:*:*", "matchCriteriaId": "90B64FDC-01C0-4A83-827D-31F477C0359B", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p4:*:*:*:*:*:*", "matchCriteriaId": "6C826F67-CA6D-4DA4-B5E9-9F4FEFE3D6D1", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p5:*:*:*:*:*:*", "matchCriteriaId": "D5666E87-F0CB-45FA-9AED-C7A0F383A559", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.3:p6:*:*:*:*:*:*", "matchCriteriaId": "6032AC16-C610-4D19-96A2-FA5233FC56B5", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:6.4:-:*:*:*:*:*:*", "matchCriteriaId": "F0F3E8EE-7DA6-4A92-8A73-4785205E4BF6", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:-:*:*:*:*:*:*", "matchCriteriaId": "1EA45D5C-199D-44A1-90B1-1157F899A01A", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p1:*:*:*:*:*:*", "matchCriteriaId": "06C1FB6A-E829-4FF3-B206-8877C9747DB2", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p3:*:*:*:*:*:*", "matchCriteriaId": "F3A3BF88-7014-440D-8AC2-FB42A779F489", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p4:*:*:*:*:*:*", "matchCriteriaId": "777E9236-AD46-484F-BC22-7F74AB6261F0", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p5:*:*:*:*:*:*", "matchCriteriaId": "4D308A1E-5364-483D-AB82-8269D576CEE8", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.0:p6:*:*:*:*:*:*", "matchCriteriaId": "A0BD460B-45CC-48DF-853D-E6BF7A7BEDFE", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.1:-:*:*:*:*:*:*", "matchCriteriaId": "93078B0C-2CA2-4A9C-A740-9947074F837C", "vulnerable": true}, {"criteria": "cpe:2.3:o:freebsd:freebsd:7.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "52DBF406-9C77-4DDA-AB7D-40FAE40023D0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Multiple unspecified vulnerabilities in FreeBSD 6 before 6.4-STABLE, 6.3 before 6.3-RELEASE-p7, 6.4 before 6.4-RELEASE-p1, 7.0 before 7.0-RELEASE-p7, 7.1 before 7.1-RC2, and 7 before 7.1-PRERELEASE allow local users to gain privileges via unknown attack vectors related to function pointers that are \"not properly initialized\" for (1) netgraph sockets and (2) bluetooth sockets."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades sin especificar en FreeBSD 6 antes de 6.4-STABLE, 6.3 antes de 6.3-RELEASE-p7, 6.4 antes de 6.4-RELEASE-p1, 7.0 antes de 7.0-RELEASE-p7, 7.1 antes de 7.1-RC2 y 7 antes de 7.1-PRERELEASE permite a usuarios locales obtener privilegios mediante vectores de ataque desconocidos relacionados con punteros de funciones que \"no est\u00e1n correctamente inicializados\" para sockets(1) netgraph y (2) bluetooth."}], "evaluatorSolution": "Per http://security.freebsd.org/advisories/FreeBSD-SA-08:13.protosw.asc\r\n\r\n\r\n\r\nSolution\r\n\r\nPerform one of the following:\r\n\r\n1) Upgrade your vulnerable system to 6-STABLE, or 7-STABLE, or to the\r\nRELENG_7_0, RELENG_6_4, or RELENG_6_3 security branch dated after the\r\ncorrection date.\r\n\r\n2) To patch your present system:\r\n\r\nThe following patches have been verified to apply to FreeBSD 6.3, 6.4,\r\nand 7.0 systems.\r\n\r\na) Download the relevant patch from the location below, and verify the\r\ndetached PGP signature using your PGP utility.\r\n\r\n[FreeBSD 6.x]\r\n# fetch http://security.FreeBSD.org/patches/SA-08:13/protosw6x.patch\r\n# fetch http://security.FreeBSD.org/patches/SA-08:13/protosw6x.patch.asc\r\n\r\n[FreeBSD 7.x]\r\n# fetch http://security.FreeBSD.org/patches/SA-08:13/protosw.patch\r\n# fetch http://security.FreeBSD.org/patches/SA-08:13/protosw.patch.asc\r\n\r\nb) Apply the patch.\r\n\r\n# cd /usr/src\r\n# patch < /path/to/patch\r\n\r\nc) Recompile your kernel as described in\r\n<URL:http://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the\r\nsystem.\r\n", "id": "CVE-2008-5736", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2008-12-26T18:30:03.467", "references": [{"source": "cve@mitre.org", "tags": ["Broken Link"], "url": "http://osvdb.org/50936"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/33209"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:13.protosw.asc"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "http://securityreason.com/securityalert/8124"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.exploit-db.com/exploits/16951"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/32976"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id?1021491"}, {"source": "cve@mitre.org", "tags": ["VDB Entry"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47570"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/7581"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "http://osvdb.org/50936"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/33209"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://security.freebsd.org/advisories/FreeBSD-SA-08:13.protosw.asc"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://securityreason.com/securityalert/8124"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.exploit-db.com/exploits/16951"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/32976"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id?1021491"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["VDB Entry"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47570"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "https://www.exploit-db.com/exploits/7581"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}, {"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}