Vulnerability Description
The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users to obtain sensitive key information by reading the file.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | <= 10.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-DiscExploit
- http://www.securityfocus.com/archive/1/535209/100/0/threaded
- http://www.securitytracker.com/id/1032042
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15:08.bsdinstall.ascExploitVendor Advisory
- http://packetstormsecurity.com/files/131338/FreeBSD-10.x-ZFS-encryption.key-DiscExploit
- http://www.securityfocus.com/archive/1/535209/100/0/threaded
- http://www.securitytracker.com/id/1032042
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15:08.bsdinstall.ascExploitVendor Advisory
FAQ
What is CVE-2015-1415?
CVE-2015-1415 is a vulnerability with a CVSS score of 2.1 (LOW). The bsdinstall installer in FreeBSD 10.x before 10.1 p9, when configuring full disk encrypted ZFS, uses world-readable permissions for the GELI keyfile (/boot/encryption.key), which allows local users...
How severe is CVE-2015-1415?
CVE-2015-1415 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1415?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.