Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 6 Feb 2008 21:54:48 +0100 (CET)
From:      Mohacsi Janos <mohacsi@niif.hu>
To:        freebsd-security@freebsd.org
Subject:   What about FreeBSD? - KAME Project "ipcomp6_input()" Denial of Service 
Message-ID:  <20080206215314.Y20917@mignon.ki.iif.hu>

next in thread | raw e-mail | index | archive | help

TITLE:
KAME Project "ipcomp6_input()" Denial of Service

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

DESCRIPTION:
A vulnerability has been reported in the KAME Project, which can be
exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the
"ipcomp6_input()" function in kame/sys/netinet6/ipcomp_input.c when
processing IPv6 packets with an IPComp header. This can be exploited
to crash a vulnerable system by sending a specially crafted IPv6
packet.

SOLUTION:
Fixed in the CVS repository.
http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37

PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Shoichi Sakane.
NetBSD credits the Coverity Prevent analysis tool.

ORIGINAL ADVISORY:
US-CERT VU#110947:
http://www.kb.cert.org/vuls/id/110947




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080206215314.Y20917>