SB2023062846 - Multiple vulnerabilities in NetBSD
Published: June 28, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Improper Authentication (CVE-ID: CVE-2023-3326)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in pam_krb5 module. A remote attacker with ability to control password and KDC responses can return a valid TGT ticket and bypass authentication process.
Successful exploitation of the vulnerability requires a non-default FreeBSD installation that leverages pam_krb5 for authentication and does not have a keytab provisioned.
2) Incorrect default permissions (CVE-ID: N/A)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to /proc/N/environ is world-readable. A local user can read files in the folder and gain access to sensitive information.
3) Memory leak (CVE-ID: N/A)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due structure padding. A local user can trigger memory leak and gain access to sensitive information.
4) Out-of-bounds read (CVE-ID: N/A)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary conditions within the compat_netbsd32, compat_linux, compat_linux32 subsystems. A local user can execute a specially crafted syscall, trigger an out-of-bounds read error and read contents of kernel memory.
5) Buffer overflow (CVE-ID: N/A)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary errors in src/sys/dev/usb/uthum.c USB device driver. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
6) Permissions, Privileges, and Access Controls (CVE-ID: N/A)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a logic error in pam_ksu(8) implementation on systems that use the module to authenticate an unprivileged user calling the su(1) command. A local user can authenticate as an arbitrary user and compromise the system.
Remediation
Install update from vendor's website.
References
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-006.txt.asc
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-004.txt.asc
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-003.txt.asc
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-002.txt.asc
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-001.txt.asc
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2023-005.txt.asc