A vulnerability has been discovered within the FreeBSD ptrace() system call and the spigot device driver. The issue exists due to the said components failing to carry out sufficient sanity checks when handling signal numbers. As a result of this design error, it is possible to pass a negative signal number to one of the vulnerable pieces of code, which will effectively result in an out-of-bounds or negative signal being delivered by the mechanism. This will typically result in an assertion failure or system panic, causing the system to crash. This issue could be exploited by an unprivileged attacker to crash a system to which they have local access. It should be noted that under default FreeBSD 5.x kernels, it may be possible for an attacker to exploit this issue in such a way as to execute arbitrary code with root privileges.
A vulnerability has been discovered within the FreeBSD ptrace() system call and the spigot device driver. The issue exists due to the said components failing to carry out sufficient sanity checks when handling signal numbers. As a result of this design error, it is possible to pass a negative signal number to one of the vulnerable pieces of code, which will effectively result in an out-of-bounds or negative signal being delivered by the mechanism. This will typically result in an assertion failure or system panic, causing the system to crash. This issue could be exploited by an unprivileged attacker to crash a system to which they have local access. It should be noted that under default FreeBSD 5.x kernels, it may be possible for an attacker to exploit this issue in such a way as to execute arbitrary code with root privileges.