Security-Alerts mailing list archive (security-alerts@yandex-team.ru)
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[security-alerts] FW: [SA21587] FreeBSD "ppp" Buffer Overflow Vulnerability
>
> TITLE:
> FreeBSD "ppp" Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA21587
>
> VERIFY ADVISORY:
> http://secunia.com/advisories/21587/
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Exposure of sensitive information, DoS, System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> FreeBSD 6.x
> http://secunia.com/product/6778/
> FreeBSD 5.x
> http://secunia.com/product/1132/
> FreeBSD 4.x
> http://secunia.com/product/139/
>
> DESCRIPTION:
> A vulnerability has been reported in FreeBSD, which can be exploited
> by malicious people to cause a DoS (Denial of Service), gain
> knowledge about potentially sensitive information, and compromise a
> vulnerable system.
>
> The vulnerability is caused due to boundary errors within the ppp
> driver when processing LCP (Link Control Protocol) options and can be
> exploited by sending specially crafted LCP packets.
>
> The vulnerability has been reported for all FreeBSD releases.
>
> SOLUTION:
> Update FreeBSD or apply patch.
>
> Fixed versions:
> 2006-08-23 22:01:44 UTC (RELENG_6, 6.1-STABLE)
> 2006-08-23 22:02:25 UTC (RELENG_6_1, 6.1-RELEASE-p4)
> 2006-08-23 22:02:52 UTC (RELENG_6_0, 6.0-RELEASE-p10)
> 2006-08-23 22:03:55 UTC (RELENG_5, 5.5-STABLE)
> 2006-08-23 22:04:28 UTC (RELENG_5_5, 5.5-RELEASE-p3)
> 2006-08-23 22:04:58 UTC (RELENG_5_4, 5.4-RELEASE-p17)
> 2006-08-23 22:05:49 UTC (RELENG_5_3, 5.3-RELEASE-p32)
> 2006-08-23 22:06:08 UTC (RELENG_4, 4.11-STABLE)
> 2006-08-23 22:06:40 UTC (RELENG_4_11, 4.11-RELEASE-p20)
>
> Patch for FreeBSD 4.x:
> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch.asc
>
> Patch for FreeBSD 5.3:
> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch.asc
>
> Patch for FreeBSD 5.4, 5.5, and 6.x:
> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch.asc
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Martin Husemann and Pavel Cahyna.
>
> ORIGINAL ADVISORY:
> http://security.freebsd.org/advisories/FreeBSD-SA-06:18.ppp.asc
>
|