Nytro Posted February 26, 2015 Report Posted February 26, 2015 FreeBSD Security Advisory - IGMP Integer OverflowAuthored by Marek Kroemeke, Mateusz Kocielski | Site security.freebsd.orgFreeBSD Security Advisory - An integer overflow in computing the size of IGMPv3 data buffer can result in a buffer which is too small for the requested operation. An attacker who can send specifically crafted IGMP packets could cause a denial of service situation by causing the kernel to crash.-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512=============================================================================FreeBSD-SA-15:04.igmp Security Advisory The FreeBSD ProjectTopic: Integer overflow in IGMP protocolCategory: coreModule: igmpAnnounced: 2015-02-25Credits: Mateusz Kocielski, Logicaltrust, Marek Kroemeke, and 22733db72ab3ed94b5f8a1ffcde850251fe6f466Affects: All supported versions of FreeBSD.Corrected: 2015-02-25 05:43:02 UTC (stable/10, 10.1-STABLE) 2015-02-25 05:56:16 UTC (releng/10.1, 10.1-RELEASE-p6) 2015-02-25 05:56:16 UTC (releng/10.0, 10.0-RELEASE-p18) 2015-02-25 05:43:02 UTC (stable/9, 9.3-STABLE) 2015-02-25 05:56:54 UTC (releng/9.3, 9.3-RELEASE-p10) 2015-02-25 05:43:02 UTC (stable/8, 8.4-STABLE) 2015-02-25 05:56:54 UTC (releng/8.4, 8.4-RELEASE-p24)CVE Name: CVE-2015-1414For general information regarding FreeBSD Security Advisories,including descriptions of the fields above, security branches, and thefollowing sections, please visit <URL:https://security.FreeBSD.org/>.I. BackgroundIGMP is a control plane protocol used by IPv4 hosts and routers to propagatemulticast group membership information. IGMP version 3 is implemented onFreeBSD.II. Problem DescriptionAn integer overflow in computing the size of IGMPv3 data buffer can resultin a buffer which is too small for the requested operation.III. ImpactAn attacker who can send specifically crafted IGMP packets could cause adenial of service situation by causing the kernel to crash.IV. WorkaroundBlock incoming IGMP packets by protecting your host/networks with a firewall.V. SolutionPerform one of the following:1) Upgrade your vulnerable system to a supported FreeBSD stable orrelease / security branch (releng) dated after the correction date.2) To update your vulnerable system via a binary patch:Systems running a RELEASE version of FreeBSD on the i386 or amd64platforms can be updated via the freebsd-update(8) utility:# freebsd-update fetch# freebsd-update install3) To update your vulnerable system via a source code patch:The following patches have been verified to apply to the applicableFreeBSD release branches.a) Download the relevant patch from the location below, and verify thedetached PGP signature using your PGP utility.# fetch https://security.FreeBSD.org/patches/SA-15:04/igmp.patch# fetch https://security.FreeBSD.org/patches/SA-15:04/igmp.patch.asc# gpg --verify igmp.patch.asc Apply the patch. Execute the following commands as root:# cd /usr/src# patch < /path/to/patchc) Recompile your kernel as described in<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot thesystem.VI. Correction detailsThe following list contains the correction revision numbers for eachaffected branch.Branch/path Revision- -------------------------------------------------------------------------stable/8/ r279263releng/8.4/ r279265stable/9/ r279263releng/9.3/ r279265stable/10/ r279263releng/10.0/ r279264releng/10.1/ r279264- -------------------------------------------------------------------------To see which files were modified by a particular revision, run thefollowing command, replacing NNNNNN with the revision number, on amachine with Subversion installed:# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/baseOr visit the following URL, replacing NNNNNN with the revision number:<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>VII. References<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1414>The latest revision of this advisory is available at<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:04.igmp.asc>-----BEGIN PGP SIGNATURE-----Version: GnuPG v2.1.1 (FreeBSD)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lkYC-----END PGP SIGNATURE-----Sursa: http://packetstormsecurity.com/files/130557 Quote