Impact
A heap‑based buffer overflow was discovered in the libnv library of FreeBSD. When libnv processes the header of an incoming message, it fails to validate the message size correctly, allowing an attacker to write beyond the bounds of a heap allocation. This out‑of‑bounds write can cause a crash or system panic and, according to the advisory, an unprivileged user may be able to exploit the flaw to elevate their privileges on the affected system.
Affected Systems
FreeBSD operating systems running the vulnerable libnv component are impacted. No specific product versions were listed in the advisory, so the extent of the vulnerability across releases is not defined in the provided data.
Risk and Exploitability
The vulnerability represents a potential privilege‑escalation path and is a classic heap‑overflow issue (CWE‑122). It has an EPSS score of <1%, indicating a low exploitation probability, and it is not listed in the CISA KEV catalog. The threat is likely localized to systems that accept incoming messages processed by libnv and requires an unprivileged user who can craft a malicious message to trigger the overflow. Given the possibility of privilege escalation and the absence of countermeasures, the risk is moderate to high until the vulnerability is patched. The CVSS score is 8.1, indicating a high severity.
OpenCVE Enrichment