Vulnerability Description
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 6.3 |
| Amd | Amd64 | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31743Vendor Advisory
- http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.asc
- http://www.securityfocus.com/bid/31003
- http://www.securitytracker.com/id?1020815
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44905
- http://secunia.com/advisories/31743Vendor Advisory
- http://security.freebsd.org/advisories/FreeBSD-SA-08:07.amd64.asc
- http://www.securityfocus.com/bid/31003
- http://www.securitytracker.com/id?1020815
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44905
FAQ
What is CVE-2008-3890?
CVE-2008-3890 is a vulnerability with a CVSS score of 7.2 (HIGH). The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during th...
How severe is CVE-2008-3890?
CVE-2008-3890 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3890?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Amd Amd64.