CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⚠ Critical CVEs Mar 26, 2026

CVE-2026-4747 | FreeBSD RPCSEC_GSS kgssapi.ko stack-based overflow

VulDB Archived Mar 26, 2026 ✓ Full text saved

A vulnerability labeled as critical has been found in FreeBSD . This issue affects some unknown processing in the library kgssapi.ko of the component RPCSEC_GSS Handler . Executing a manipulation can lead to stack-based buffer overflow. This vulnerability is handled as CVE-2026-4747 . The attack can be executed remotely. There is not any exploit available. It is best practice to apply a patch to resolve this issue.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-353567 · CVE-2026-4747 · GCVE-0-2026-4747 FREEBSD RPCSEC_GSS KGSSAPI.KO STACK-BASED OVERFLOW HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 8.4 $5k-$25k 4.67+ Summaryinfo A vulnerability marked as critical has been reported in FreeBSD. Impacted is an unknown function in the library kgssapi.ko of the component RPCSEC_GSS Handler. The manipulation leads to stack-based overflow. This vulnerability is uniquely identified as CVE-2026-4747. The attack is possible to be carried out remotely. No exploit exists. It is recommended to apply a patch to fix this issue. Detailsinfo A vulnerability, which was classified as critical, has been found in FreeBSD (the affected version is unknown). This issue affects an unknown code in the library kgssapi.ko of the component RPCSEC_GSS Handler. The manipulation with an unknown input leads to a stack-based overflow vulnerability. Using CWE to declare the problem leads to CWE-121. A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). Impacted is confidentiality, integrity, and availability. The summary by CVE is: Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system. The weakness was disclosed by Nicholas Carlini. It is possible to read the advisory at security.freebsd.org. The identification of this vulnerability is CVE-2026-4747 since 03/24/2026. The exploitation is known to be easy. The attack may be initiated remotely. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 03/26/2026). Applying a patch is able to eliminate this problem. Productinfo Type Operating System Name FreeBSD License open-source Website Product: https://www.freebsd.org/ CPE 2.3info 🔒 CPE 2.2info 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 8.8 VulDB Meta Temp Score: 8.4 VulDB Base Score: 8.8 VulDB Temp Score: 8.4 VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Stack-based overflow CWE: CWE-121 / CWE-119 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Patch Status: 🔍 0-Day Time: 🔒 Timelineinfo 03/24/2026 CVE reserved 03/26/2026 +2 days Advisory disclosed 03/26/2026 +0 days VulDB entry created 03/26/2026 +0 days VulDB entry last update Sourcesinfo Product: freebsd.org Advisory: security.freebsd.org Researcher: Nicholas Carlini Status: Confirmed CVE: CVE-2026-4747 (🔒) GCVE (CVE): GCVE-0-2026-4747 GCVE (VulDB): GCVE-100-353567 Entryinfo Created: 03/26/2026 08:53 Changes: 03/26/2026 08:53 (55) Complete: 🔍 Cache ID: 99:63D:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⚠ Critical CVEs
    Published
    Mar 26, 2026
    Archived
    Mar 26, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗