OpenBSD Semget() Integer Overflow...

- AV AC AU C I A
发布: 2003-08-20
修订: 2025-04-13

A vulnerability has been discovered in the OpenBSD semget() system call. The problem occurs due to insufficient sanity checks before allocating memory using the user-supplied nsems value as an argument. As a result, an attacker may be capable of modifying the running kernel. This vulnerability was introduced in OpenBSD 3.3 and as such, no other versions are affected.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息