Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 26 Sep 2003 08:06:32 -0500
From:      Derek Ragona <derek@computinginnovations.com>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-03:14.arp [REVISED]
Message-ID:  <5.2.1.1.2.20030926080527.011d9f48@www.computinginnovations.com>

next in thread | raw e-mail | index | archive | help
I have two servers one is:
  5.1-RELEASE-p6
the other is:
5.1-RELEASE-p7

cvsup'd them both, neither will complete a buildworld, they both error 
trying to compile.

Anyone got this to work on RELENG_5_1?

         -Derek


At 07:07 AM 9/25/2003 -0700, FreeBSD Security Advisories wrote:
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>=============================================================================
>FreeBSD-SA-03:14.arp                                        Security Advisory
>                                                           The FreeBSD Project
>
>Topic:          denial of service due to ARP resource starvation
>
>Category:       core
>Module:         sys
>Announced:      2003-09-25
>Credits:        Apple Product Security <product-security@apple.com>
>Affects:        All releases of FreeBSD
>                 FreeBSD 4-STABLE prior to the correction date
>Corrected:      2003-09-24 21:48:00 UTC (RELENG_4, 4.9-PRERELEASE)
>                 2003-09-25 13:33:01 UTC (RELENG_5_1, 5.1-RELEASE-p8)
>                 2003-09-25 13:33:29 UTC (RELENG_5_0, 5.0-RELEASE-p16)
>                 2003-09-25 13:34:14 UTC (RELENG_4_8, 4.8-RELEASE-p10)
>                 2003-09-25 13:34:31 UTC (RELENG_4_7, 4.7-RELEASE-p20)
>                 2003-09-25 13:34:52 UTC (RELENG_4_6, 4.6-RELEASE-p23)
>                 2003-09-25 13:35:18 UTC (RELENG_4_5, 4.5-RELEASE-p34)
>                 2003-09-25 13:35:33 UTC (RELENG_4_4, 4.4-RELEASE-p44)
>                 2003-09-25 13:35:48 UTC (RELENG_4_3, 4.3-RELEASE-p40)
>FreeBSD only:   NO
>
>For general information regarding FreeBSD Security Advisories,
>including descriptions of the fields above, security branches, and the
>following sections, please visit
><URL:http://www.freebsd.org/security/>.
>
>0.   Revision History
>
>v1.0  2003-09-23  Initial release.
>v1.1  2003-09-25  Initial patch was incorrect.
>
>I.   Background
>
>The Address Resolution Protocol (ARP) is fundamental to the operation
>of IP with a variety of network technologies, such as Ethernet and
>WLAN.  It is used to map IP addresses to MAC addresses, which enables
>hosts on a local network segment to communicate with each other
>directly.  These mappings are stored in the system's ARP cache.
>
>FreeBSD's ARP cache is implemented within the kernel routing table as
>a set of routes for the address family in use that have the LLINFO
>flag set.  This is most commonly often AF_INET (for IPv4).  Normally,
>when a FreeBSD system receives an ARP request for a network address
>configured on one of its interfaces from a system on a local network,
>it adds a reciprocal ARP entry to the cache for the system from where
>the request originated.  Expiry timers are used to purge unused
>entries from the ARP cache.  A reference count is maintained for each
>ARP entry.  If the reciprocal ARP entry is not in use by an upper
>layer protocol, the reference count will be zero.
>
>II.  Problem Description
>
>Under certain circumstances, it is possible for an attacker to flood a
>FreeBSD system with spoofed ARP requests, causing resource starvation
>which eventually results in a system panic.  (The critical condition
>is that a route exists for the apparent source of the ARP request.
>This is always the case if the system has a default route configured
>for that protocol family.)
>
>If a large number of ARP requests with different network protocol
>addresses are sent in a small space of time, resource starvation can
>result, as the arplookup() function does not delete unnecessary ARP
>entries cached as the result of responding to an ARP request.
>
>NOTE WELL: Other BSD-derived systems may also be affected, as the
>affected code dates well back to the CSRG branches.
>
>III. Impact
>
>An attacker on the local network may be able to cause the system to
>hang or crash.  The attacker must have physical access to the shared
>network medium.  In the case of a wireless network obtaining this
>access may be trivial.  Networks where proxy ARP is used to direct
>traffic between LANs may be particularly vulnerable to the attack,
>as the spoofed ARP requests could be bounced through to the target
>via routers implementing proxy ARP.
>
>Because the attack operates at Layer 2, the use of strong encryption
>technologies such as IPsec cannot protect a system against the attack.
>
>IV.  Workaround
>
>There is no known workaround at this time.
>
>V.   Solution
>
>Do one of the following:
>
>1) Upgrade your vulnerable system to 4-STABLE; or to the RELENG_5_1,
>RELENG_5_0, RELENG_4_8, or RELENG_4_7 security branch dated after the
>correction date.
>
>2) To patch your present system:
>
>The following patch has been verified to apply to FreeBSD 5-CURRENT,
>4.9-PRERELEASE, and 4.8 systems.
>
>a) Download the relevant patch from the location below, and verify the
>detached PGP signature using your PGP utility.
>
>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:14/arp.patch
>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:14/arp.patch.asc
>
>b) Execute the following commands as root:
>
># cd /usr/src
># patch < /path/to/patch
>
>c) Rebuild your kernel as described in
><URL:http://www.freebsd.org/handbook/kernelconfig.html>;
>and reboot the system.
>
>VI.  Correction details
>
>The following list contains the revision numbers of each file that was
>corrected in FreeBSD.
>
>Branch                                                           Revision
>   Path
>- -------------------------------------------------------------------------
>RELENG_4
>   src/sys/netinet/if_ether.c                                    1.64.2.26
>RELENG_5_1
>   src/UPDATING                                                 1.251.2.10
>   src/sys/conf/newvers.sh                                       1.50.2.10
>   src/sys/netinet/if_ether.c                                    1.104.2.2
>RELENG_5_0
>   src/UPDATING                                                 1.229.2.22
>   src/sys/conf/newvers.sh                                       1.48.2.17
>   src/sys/netinet/if_ether.c                                     1.96.2.2
>RELENG_4_8
>   src/UPDATING                                             1.73.2.80.2.12
>   src/sys/conf/newvers.sh                                  1.44.2.29.2.11
>   src/sys/netinet/if_ether.c                                1.64.2.22.2.2
>RELENG_4_7
>   src/UPDATING                                             1.73.2.74.2.23
>   src/sys/conf/newvers.sh                                  1.44.2.26.2.22
>   src/sys/netinet/if_ether.c                                1.64.2.19.2.2
>RELENG_4_6
>   src/UPDATING                                             1.73.2.68.2.52
>   src/sys/conf/newvers.sh                                  1.44.2.23.2.40
>   src/sys/netinet/if_ether.c                                1.64.2.18.2.2
>RELENG_4_5
>   src/UPDATING                                             1.73.2.50.2.51
>   src/sys/conf/newvers.sh                                  1.44.2.20.2.35
>   src/sys/netinet/if_ether.c                                1.64.2.15.2.2
>RELENG_4_4
>   src/UPDATING                                             1.73.2.43.2.52
>   src/sys/conf/newvers.sh                                  1.44.2.17.2.43
>   src/sys/netinet/if_ether.c                                1.64.2.11.2.2
>RELENG_4_3
>   src/UPDATING                                             1.73.2.28.2.39
>   src/sys/conf/newvers.sh                                  1.44.2.14.2.29
>   src/sys/netinet/if_ether.c                                1.64.2.10.2.2
>- -------------------------------------------------------------------------
>
>VII. References
>
><URL:http://docs.info.apple.com/article.html?artnum=61798>;
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.2.3 (FreeBSD)
>
>iD8DBQE/cvNNFdaIBMps37IRAlIsAJ9Kj0u+ZUEOUcpqjl6hISvrALwGQgCfaG5m
>jpFBTK86xjFNz4t43ZQtcOU=
>=cfvr
>-----END PGP SIGNATURE-----
>_______________________________________________
>freebsd-security-notifications@freebsd.org mailing list
>http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications
>To unsubscribe, send any mail to 
>"freebsd-security-notifications-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.2.1.1.2.20030926080527.011d9f48>