Date: Mon, 21 Oct 2002 21:21:08 -0400 From: Mike Tancsa <mike@sentex.net> To: security@freebsd.org Subject: Fwd: [Full-Disclosure] NetBSD Security Advisory 2002-016: Insufficient length check in ESP authentication data Message-ID: <5.1.1.6.0.20021021211946.05c98cf8@marble.sentex.ca>
next in thread | raw e-mail | index | archive | help
It would appear the CERT url below mentions FreeBSD as well being vulerable.
---Mike
>To: full-disclosure@lists.netsys.com
>From: NetBSD Security Officer <security-officer@netbsd.org>
>Organisation: The NetBSD Foundation, Inc.
>Reply-To: NetBSD Security Officer <security-officer@netbsd.org>
>Subject: [Full-Disclosure] NetBSD Security Advisory 2002-016: Insufficient
>length check in ESP authentication data
>Sender: full-disclosure-admin@lists.netsys.com
>X-BeenThere: full-disclosure@lists.netsys.com
>X-Mailman-Version: 2.0.12
>List-Unsubscribe: <http://lists.netsys.com/mailman/listinfo/full-disclosure>,
> <mailto:full-disclosure-request@lists.netsys.com?subject=unsubscribe>
>List-Id: Discussion of security issues <full-disclosure.lists.netsys.com>
>List-Post: <mailto:full-disclosure@lists.netsys.com>
>List-Help: <mailto:full-disclosure-request@lists.netsys.com?subject=help>
>List-Subscribe: <http://lists.netsys.com/mailman/listinfo/full-disclosure>,
> <mailto:full-disclosure-request@lists.netsys.com?subject=subscribe>
>List-Archive: <http://lists.netsys.com/pipermail/full-disclosure/>
>Date: Tue, 22 Oct 2002 09:39:32 +0900
>X-Spam-Status: No, hits=-7.9 required=5.0
>tests=COPYRIGHT_CLAIMED,PGP_SIGNATURE version=2.11
>X-Virus-Scanned: By Sentex Communications (avscan1/20020517)
>
>-----BEGIN PGP SIGNED MESSAGE-----
>
>
> NetBSD Security Advisory 2002-016
> =================================
>
>Topic: Insufficient length check in ESP authentication data
>
>Version: NetBSD-current: source prior to August 23, 2002
> NetBSD-1.6 beta: source prior to August 23, 2002
> NetBSD-1.5.3: affected
> NetBSD-1.5.2: affected
> NetBSD-1.5.1: affected
> NetBSD-1.5: affected
> NetBSD-1.4.*: not affected (no IPsec shipped with it)
>
>Severity: remote denial of service (kernel panic by malicious packet)
>
>Fixed: NetBSD-current: August 23, 2002
> NetBSD-1.6 branch: August 23, 2002 (1.6 includes the
> fix)
> NetBSD-1.5 branch: September 5, 2002
>
>Abstract
>========
>
>The KAME-based IPsec implementation included in NetBSD was missing
>some packet length checks, and could be tricked into passing negative
>value as buffer length. By transmiting a specially-formed (very
>short) ESP packet, a malicious sender can cause a cause kernel panic
>on the victim node.
>
>For the attack to be effective the attacker has to have knowledge of
>the ESP settings being used by the victim node (wiretapping traffic
>would achieve this). Also victim node has to be configured with
>certain ESP security-association (SA).
>
>The publication of this advisory is delayed to coordinate with third parties.
>
>
>Technical Details
>=================
>
>http://www.kb.cert.org/vuls/id/459371
>
>Your system is not vulnerable if:
> - you do not enable IPsec ESP in the kernel (options IPSEC_ESP), or
> - you do not have IPsec ESP SA with ESP authentication data setting
> active on your system. However, if you have IPSEC_ESP enabled, we
> suggest upgrading your kernel to bring in the fix, even if you are
> not presently using IPSec.
>
>
>Solutions and Workarounds
>=========================
>
>The recent NetBSD 1.6 release is not vulnerable to this issue. A full
>upgrade to NetBSD 1.6 is the recommended resolution for all users able
>to do so. Many security-related improvements have been made, and
>indeed this release has been delayed several times in order to include
>fixes for a number of recent issues.
>
>If you are using ESP with authentication, you must upgrade to avoid
>the vulnerability, as described below for your version of NetBSD:
>
>* NetBSD-current:
>
> Systems running NetBSD-current dated from before 2002-08-23
> should be upgraded to NetBSD-current dated 2002-08-23 or later.
>
> The kernel code needs to be updated from the netbsd-1-6 CVS branch.
>
> To update from CVS:
> # cd src
> # cvs update -d -P sys
>
> See http://www.netbsd.org/Documentation/kernel/#how_to_build_a_kernel
> on how you rebuild the kernel.
>
>
>* NetBSD 1.6 betas:
>
> Systems running NetBSD 1.6 BETAs and Release Candidates should
> be upgraded to the NetBSD 1.6 release.
>
> If a source-based point upgrade is required, sources from the
> NetBSD 1.6 branch dated 2002-08-23 or later should be used.
>
> The kernel code needs to be updated from the netbsd-1-6 CVS branch.
>
> To update from CVS:
> # cd src
> # cvs update -d -P -r netbsd-1-6 sys
>
> See http://www.netbsd.org/Documentation/kernel/#how_to_build_a_kernel
> for instructions on how you rebuild the kernel.
>
>
>* NetBSD 1.5, 1.5.1, 1.5.2, 1.5.3:
>
> Systems running NetBSD 1.5 branch dated from before 2002-09-05
> should be upgraded to NetBSD 1.5 tree dated 2002-09-05 or later.
>
> The kernel code needs to be updated from the netbsd-1-5 CVS branch.
>
> To update from CVS:
> # cd src
> # cvs update -d -P -r netbsd-1-5 sys
>
> See http://www.netbsd.org/Documentation/kernel/#how_to_build_a_kernel
> for instructions on how you rebuild the kernel.
>
>
>Thanks To
>=========
>
>Todd Sabin and BindView for analysis and report.
>
>The NetBSD Release Engineering teams, for great patience and
>assistance in dealing with repeated security issues discovered
>recently.
>
>
>Revision History
>================
>
> 2002-10-22 Initial release
>
>
>More Information
>================
>
>An up-to-date PGP signed copy of this release will be maintained at
>
>ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-016.txt.asc
>
>Information about NetBSD and NetBSD security can be found at
>http://www.NetBSD.ORG/ and http://www.NetBSD.ORG/Security/.
>
>
>Copyright 2002, The NetBSD Foundation, Inc. All Rights Reserved.
>
>$NetBSD: NetBSD-SA2002-016.txt,v 1.16 2002/10/22 00:27:56 itojun Exp $
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: 2.6.3ia
>Charset: noconv
>
>iQCVAwUBPbSbdD5Ru2/4N2IFAQGFwAQAlHyFjYgN3FMHu+V9SGRZVgVpUWgVYDHJ
>UWBKb/wNECmFHQ+pXNFmXfnV7Ly7OZCsiUiKVRHgkWqNH9r75WyAwmK7nEoPXAn8
>w1fe7dVqpiuKL/uyDe3T/oWKGIbbGk7iU624TeJrB99aj6el2rB/jOdzu4LVIgRm
>5rQdRYKniWM=
>=cNIB
>-----END PGP SIGNATURE-----
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.0.20021021211946.05c98cf8>
