Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Remote Exploit Discovered for OpenBSD
Core Security ^ | 2007-03-13 | Core Security labs

Posted on 03/15/2007 10:23:10 AM PDT by zeugma

Core Security is reporting a remote buffer exploit for the OpenBSD operating system. This is also being reported on /.

Title: OpenBSD's IPv6 mbufs remote kernel buffer overflow

Class: Buffer Overflow

Remotely Exploitable: Yes

Locally Exploitable: No

 

Advisory URL:
http://www.coresecurity.com/?action=item&id=1703

Vendors contacted:

OpenBSD.org

 

Vulnerability Description
The OpenBSD kernel contains a memory corruption vulnerability in the code that handles IPv6 packets. Exploitation of this vulnerability can result in:

1) Remote execution of arbitrary code at the kernel level on the vulnerable systems (complete system compromise), or;

2) Remote denial of service attacks against vulnerable systems (system crash due to a kernel panic)

The issue can be triggered by sending a specially crafted IPv6 fragmented packet.

OpenBSD systems using default installations are vulnerable because the default pre-compiled kernel binary (GENERIC) has IPv6 enabled and OpenBSD's firewall does not filter inbound IPv6 packets in its default configuration.

However, in order to exploit a vulnerable system an attacker needs to be able to inject fragmented IPv6 packets on the target system's local network. This requires direct physical/logical access to the target's local network -in which case the attacking system does not need to have a working IPv6 stack- or the ability to route or tunnel IPv6 packets to the target from a remote network.

Vulnerable Packages

OpenBSD 4.1 prior to Feb. 26th, 2006.
OpenBSD 4.0 Current
OpenBSD 4.0 Stable
OpenBSD 3.9
OpenBSD 3.8
OpenBSD 3.6
OpenBSD 3.1

All other releases that implement the IPv6 protocol stack may be vulnerable.

Solution/Vendor Information/Workaround
The OpenBSD team has released a "security fix" to correct the mbuf problem, it is available as a source code patch for
OpenBSD 4.0 and 3.9 here:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.0/common/010_m_dup1.patch

The patch can also be applied to previous versions of OpenBSD.

OpenBSD-current, 4.1, 4.0 and 3.9 have the fix incorporated in their source code tree and kernel binaries for those versions and the upcoming version 4.1 include the fix.

As a work around, users that do not need to process or route IPv6 traffic on their systems can block all inbound IPv6 packets using OpenBSD's firewall. This can be accomplished by adding the following line to /etc/pf.conf:

block in quick inet6 all

After adding the desired rules to pf.conf it is necessary to load them to the running PF using:

pfctl -f /etc/pf.conf

To enable PF use:
pfctl -e -f /etc/pf.conf

To check the status of PF and list all loaded rules use:
pfctl -s rules

Refer to the pf.conf(5) and pfctl(8) manpages for proper configuration and use of OpenBSD's firewall capabilities.


 


TOPICS: Business/Economy; Miscellaneous; News/Current Events; Technical
KEYWORDS: bsd; bug; remoteexploit; vulnerability
Remotely explotable  bugs are bad news. To the best of my knowledge, this is only the 2nd such bug ever discovered in BSD. -Z

Proof of concept code was published with the advisory. If you're running OpenBSD and use IPV6 (which actually should be a fairly small group), you should check out the patch linked to in the advisory.

If you're not using IPV6, you may mitigate the impact by following the instructions published by the OpenBSD team to deal with the threat.



1 posted on 03/15/2007 10:23:20 AM PDT by zeugma
[ Post Reply | Private Reply | View Replies]

To: N3WBI3; ShadowAce

Tech folk might be interested.


2 posted on 03/15/2007 10:24:07 AM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Does it apply to other flavors like FreeBSD or OS X?


3 posted on 03/15/2007 10:26:19 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat
Does it apply to other flavors like FreeBSD or OS X?

As of right now, it doesn't look like it. I'm sure other folks are boing to be banging on the IPv6 code on all distros in a similar manner though, so we'll find out. 

4 posted on 03/15/2007 10:44:34 AM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 3 | View Replies]

To: zeugma

Whew. I thought the headline read, OpenBDS. We would've been overrun with trolls.


5 posted on 03/15/2007 10:46:08 AM PDT by 1rudeboy
[ Post Reply | Private Reply | To 1 | View Replies]

To: 1rudeboy

"To enable PF use:
pfctl -e -f /etc/pf.conf"

Ah ha! it's all very clear now - it was Colonel Mustard in the cloak room with a candle stick!!!


6 posted on 03/15/2007 10:49:42 AM PDT by Domicile of Doom (Hey boy why is there dirt in my hole? I dunno Boss.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: 1rudeboy
Whew. I thought the headline read, OpenBDS. We would've been overrun with trolls.

Especially if FR allowed mp3 embeds. We'd be ODing on Enigma.

7 posted on 03/15/2007 11:01:11 AM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; PenguinWry; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; ..

8 posted on 03/16/2007 4:03:18 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Exploits on BSD are boring, they always have a fix in the same announcement. i prefer windows where it will sit out there for several weeks before something gets done about it.


nothing to see here, move along people.


9 posted on 03/17/2007 10:21:12 AM PDT by postaldave (republicans need spending rehab before trying to control congress again.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: postaldave
Exploits on BSD are boring, they always have a fix in the same announcement.


LOL. Trouble is, the BSD exploit sample size is really too small to be able to make  such a generalization.

 
i prefer windows where it will sit out there for several weeks before something gets done about it.

I guess it does kinda bring some excitement into your day.

10 posted on 03/17/2007 2:54:15 PM PDT by zeugma (MS Vista has detected your mouse has moved, Cancel or Allow?)
[ Post Reply | Private Reply | To 9 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson