SB2018041003 - Multiple vulnerabilities in NetBSD
Published: April 10, 2018
Security Bulletin ID
SB2018041003
Severity
Medium
Patch available
YES
Number of vulnerabilities
6
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Privilege escalation (CVE-ID: N/A)
The vulnerability allows a local attacker to gain elevated privileges on the target system.The weakness exists due to a mistake the Xen-amd64 port of NetBSD, where iopl was unintentionally set to ring3. A local attacker can gain elevated privileges and read from and write to the CPU's I/O ports.
2) Use-after-free error (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to several possible use-after-frees existed in the MPLS code. A remote attacker can trigger memory corruption and cause the system to panic.
3) Memory leak (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory leak in the IPv6-NBR entry point. A remote attacker can trigger memory corruption and cause the kernel to run out of memory.
4) Double free error (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to double-free bug in the Pim6 (IPv6 multicast) entry point. A remote attacker can trigger memory corruption and cause the kernel to panic.
5) Improper input validation (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to two sysctls wrongfully allowed IPv4 source-routed packets to be accepted by the kernel. A remote attacker can send specially crafted source-routed packets and cause kernel to panic.
6) Improper input validation (CVE-ID: N/A)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to signedness bug in NetBSD's implementation of the PF firewall. A remote attacker can send specially crafted TCP-SYN packet while PF had a configuration of the type "pass in [...] tcp [...] modulate state", trigger out-of-bounds read and cause the system to crash.
Remediation
Install update from vendor's website.