SB2023062846 - Multiple vulnerabilities in NetBSD



SB2023062846 - Multiple vulnerabilities in NetBSD

Published: June 28, 2023

Security Bulletin ID SB2023062846
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 17% Low 83%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Improper Authentication (CVE-ID: CVE-2023-3326)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in pam_krb5 module. A remote attacker with ability to control password and KDC responses can return a valid TGT ticket and bypass authentication process.

Successful exploitation of the vulnerability requires a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned.


2) Incorrect default permissions (CVE-ID: N/A)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to /proc/N/environ is world-readable. A local user can read files in the folder and gain access to sensitive information.


3) Memory leak (CVE-ID: N/A)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due structure padding. A local user can trigger memory leak and gain access to sensitive information.


4) Out-of-bounds read (CVE-ID: N/A)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary conditions within the compat_netbsd32, compat_linux, compat_linux32 subsystems. A local user can execute a specially crafted syscall, trigger an out-of-bounds read error and read contents of kernel memory.


5) Buffer overflow (CVE-ID: N/A)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary errors in src/sys/dev/usb/uthum.c USB device driver. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.


6) Permissions, Privileges, and Access Controls (CVE-ID: N/A)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic error in pam_ksu(8) implementation on systems that use the module to authenticate an unprivileged user calling the su(1) command. A local user can authenticate as an arbitrary user and compromise the system.


Remediation

Install update from vendor's website.