SB2018041003 - Multiple vulnerabilities in NetBSD



SB2018041003 - Multiple vulnerabilities in NetBSD

Published: April 10, 2018

Security Bulletin ID SB2018041003
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 83% Low 17%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: N/A)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to a mistake the Xen-amd64 port of NetBSD, where iopl was unintentionally set to ring3. A local attacker can gain elevated privileges and read from and write to the CPU's I/O ports.

2) Use-after-free error (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to several possible use-after-frees existed in the MPLS code. A remote attacker can trigger memory corruption and cause the system to panic.

3) Memory leak (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory leak in the IPv6-NBR entry point. A remote attacker can trigger memory corruption and cause the kernel to run out of memory.

4) Double free error (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to double-free bug in the Pim6 (IPv6 multicast) entry point. A remote attacker can trigger memory corruption and cause the kernel to panic.

5) Improper input validation (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to two sysctls wrongfully allowed IPv4 source-routed packets to be accepted by the kernel. A remote attacker can send specially crafted source-routed packets and cause kernel to panic.

6) Improper input validation (CVE-ID: N/A)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to signedness bug in NetBSD's implementation of the PF firewall. A remote attacker can send specially crafted TCP-SYN packet while PF had a configuration of the type "pass in [...] tcp [...] modulate state", trigger out-of-bounds read and cause the system to crash.

Remediation

Install update from vendor's website.