Memory corruption in NetBSD - #VU10459

 

Memory corruption in NetBSD - #VU10459

Published: February 12, 2018 / Updated: March 9, 2018


Vulnerability identifier: #VU10459
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: N/A
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: NetBSD Foundation, Inc
Affected software:
NetBSD

Detailed vulnerability description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing IPv6 packets within "src/sys/netinet6/frag6.c" file. A remote unauthenticated attacker can send a series of specially crafted IPv6 packets, trigger memory corruption and cause denial of service conditions or execute arbitrary code on the target system.

Successful exploitation of this vulnerability may allow an attacker to remotely execute arbitrary code on the vulnerable system with kernel privileges.

This is a highly critical vulnerability, since IPv6 support is enabled by default in NetBSD.


Remediation

Install update from vendor's repository.

Sources