Remote DoS and information disclosure in NetBSD



Published: 2017-02-19
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID N/A
CWE-ID CWE-125
CWE-401
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
NetBSD
Operating systems & Components / Operating system

Vendor NetBSD Foundation, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU5867

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to insufficient validation of hardware and protocol lengths when processing ARP headers. A remote unauthenticated attacker in one network segment with vulnerable system can send specially crafted ARP packet with the highest encodable lengths and cause the kernel to copy in the reply packet more data than is available. A remote attacker can obtain 249 bytes of kernel memory over an Ethernet link.

Successful exploitation may allow an attacker to obtain potentially sensitive information from kernel memory.

Mitigation

Install update from CVS repository.

Vulnerable software versions

NetBSD: 6.0 - 7.0.2

External links

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Memory leak

EUVDB-ID: #VU5866

Risk: Medium

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform denial of service (DoS) attack.

The vulnerability exists due to memory leak when processing ARP packets. A remote unauthenticated attacker in one network segment with vulnerable system can send specially crafted ARP requests to vulnerable system, trigger memory leak and consume all available memory resources on the system.

Successful exploitation of the vulnerability may allow an attacker to perform denial of service (DoS) attack.

Mitigation

Install update from CVS repository.

Vulnerable software versions

NetBSD: 6.0 - 7.0.2

External links

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###