RPCSEC_GSS stack buffer overflow (CVE-2026-4747)
CVE-2026-4747
Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is s...
Overview
A critical stack-based buffer overflow vulnerability, identified as CVE-2026-4747, has been discovered in FreeBSD’s implementation of the RPCSEC_GSS security protocol. This flaw resides in a packet validation routine that fails to properly check data sizes before copying them, allowing an attacker to overflow a stack buffer. Exploitation can lead to remote code execution.
Vulnerability Details
The vulnerability exists in the code responsible for validating signed RPCSEC_GSS data packets. A specific routine copies a portion of an incoming network packet into a fixed-size stack buffer but does not verify that the data fits within the buffer’s limits. A maliciously crafted packet can therefore write data past the end of the buffer, corrupting the stack.
Crucially, this validation occurs before client authentication. This means an attacker does not need valid credentials to send the malicious packet that triggers the overflow, significantly lowering the barrier for exploitation.
Impact and Severity
This is a HIGH severity vulnerability with a CVSS score of 8.8. The impact varies by context:
- Kernel-level Impact: If the
kgssapi.kokernel module is loaded (e.g., when using the kernel NFS server with Kerberos), a remote, authenticated user could potentially execute arbitrary code within the kernel, leading to a full system compromise. - User-level Impact: Any user-space application that has the
librpcgss_seclibrary loaded and is running an RPC server is vulnerable to remote code execution from any unauthenticated client able to send it packets.
For the latest on active threats and data breaches, you can review current breach reports.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Action: Patch Apply the official security patches provided by the FreeBSD Project as soon as they are released. Update your FreeBSD systems to the corrected versions. Regularly monitor security news for official updates and advisories.
Immediate Mitigations:
- Unload the Kernel Module: If you are not using Kerberos with the kernel NFS server, unload the
kgssapi.komodule to eliminate the kernel attack vector. This can be done with the commandkldunload kgssapi. - Network Controls: Restrict network access to RPC services (especially those using RPCSEC_GSS) using firewall rules. Limit exposure to only trusted, necessary networks.
- Review Applications: Audit user-space applications to identify any that use
librpcgss_secand expose RPC services. Consider disabling or isolating these services until patches can be applied.
System administrators should treat this vulnerability as a critical priority due to its potential for unauthenticated remote code execution.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-suppli...
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-suppli...
The specific flaw exists within the Bluetooth stack developed by Alps Alpine of the Infotainment ECU manufactured by Bosch. The issue results from the lack of proper boundary validation of user-suppli...
An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Mod...