SB2018020818 - Multiple vulnerabilities in OpenBSD
Published: February 8, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 vulnerabilities.
1) Improper input validation (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPsec AH packets with IP options or IPv6 extension and cause the kernel to crash or hang.
2) Improper input validation (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPv6 fragments, incorrectly access memory of an mbuf chain that is not within an mbuf and cause the kernel to crash.
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to the EtherIP tunnel protocol was disabled. A remote attacker can trigger improper discarding of IPv6 packets and double free error to cause the kernel to crash.
4) Spoofing attack (CVE-ID: N/A)
The vulnerability allows a remote attacker to perform spoofing attack.
The weakness exists due to a flaw in the way unbound validated wildcard-synthesized NSEC records. A remote attacker can supply a specially crafted wildcard NSEC record and prove the non-existence (NXDOMAIN answer) of an existing wildcard record, or trick unbound into accepting a NODATA proof.
Remediation
Install update from vendor's website.
References
- http://www.openbsd.org/errata61.html
- http://www.openbsd.org/errata62.html
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/034_ahopts.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/035_prevhdr.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.1/common/036_etherip.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/6.2/common/008_unbound.patch.sig