From owner-freebsd-security@FreeBSD.ORG Wed Feb 6 22:01:04 2008 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C48FB16A419 for ; Wed, 6 Feb 2008 22:01:04 +0000 (UTC) (envelope-from remko@elvandar.org) Received: from galain.elvandar.org (galain.elvandar.org [217.148.169.56]) by mx1.freebsd.org (Postfix) with ESMTP id 8507B13C45B for ; Wed, 6 Feb 2008 22:01:04 +0000 (UTC) (envelope-from remko@elvandar.org) Received: from evilcoder.xs4all.nl ([195.64.94.120] helo=Inbox) by galain.elvandar.org with esmtpa (Exim 4.67) (envelope-from ) id 1JMrOo-000IEM-2P; Wed, 06 Feb 2008 22:01:42 +0100 MIME-Version: 1.0 From: Remko Lodder Date: Wed, 6 Feb 2008 22:01:41 +0100 Importance: normal X-Priority: 3 To: Mohacsi Janos , Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="iso-8859-1" Message-Id: <20080206220104.8507B13C45B@mx1.freebsd.org> Cc: Subject: RE: What about FreeBSD? - KAME Project "ipcomp6_input()" Denial of Service X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Feb 2008 22:01:04 -0000 We are aware and working on resolving this. Thanks Remko Hat: freebsd secteam -----Original Message----- From: "Mohacsi Janos" To: freebsd-security@freebsd.org Sent: 6-2-08 21:54 Subject: What about FreeBSD? - KAME Project "ipcomp6_input()" Denial of Ser= vice=20 TITLE: KAME Project "ipcomp6_input()" Denial of Service CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote DESCRIPTION: A vulnerability has been reported in the KAME Project, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the "ipcomp6_input()" function in kame/sys/netinet6/ipcomp_input.c when processing IPv6 packets with an IPComp header. This can be exploited to crash a vulnerable system by sending a specially crafted IPv6 packet. SOLUTION: Fixed in the CVS repository. http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.d= iff?r1=3D1.36;r2=3D1.37 PROVIDED AND/OR DISCOVERED BY: US-CERT credits Shoichi Sakane. NetBSD credits the Coverity Prevent analysis tool. ORIGINAL ADVISORY: US-CERT VU#110947: http://www.kb.cert.org/vuls/id/110947 _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"