Memory leak in NetBSD - #VU5226
Published: January 22, 2017 / Updated: January 22, 2017
Vulnerability identifier: #VU5226
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-401
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: NetBSD Foundation, Inc
Affected software:
NetBSD
NetBSD
Detailed vulnerability description
The vulnerability allows a local user to cause denial of service conditions.
The vulnerability exists due to an error within sys/kern/uipc_usrreq.c file when calling the connect system call on a particular file descriptor with specific arguments. A local user can repeatedly send a specially crafted connect() system call to trigger a memory leak and consume all memory resources on the target system.
Successful exploitation of this vulnerability may allow a local user to cause denial of service (DoS).
The vulnerability exists due to an error within sys/kern/uipc_usrreq.c file when calling the connect system call on a particular file descriptor with specific arguments. A local user can repeatedly send a specially crafted connect() system call to trigger a memory leak and consume all memory resources on the target system.
Successful exploitation of this vulnerability may allow a local user to cause denial of service (DoS).
Remediation
Install patch from vendor's website:
To update from CVS, re-build, and re-install the kernel:
To update from CVS, re-build, and re-install the kernel:
# cd src # cvs update -d -P -r VERSION sys/kern/uipc_usrreq.c # ./build.sh kernel=KERNCONF # mv /netbsd /netbsd.old # cp sys/arch/ARCH/compile/obj/KERNCONF/netbsd /netbsd # shutdown -r now