ПРОЕКТЫ 


  АРХИВ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  СТАТЬИ 


  ПЕРСОНАЛЬНОЕ 


  ПРОГРАММЫ 



ПИШИТЕ
ПИСЬМА














     АРХИВ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [security-alerts] FW: [SA21587] FreeBSD "ppp" Buffer Overflow Vulnerability





> -----Original Message-----
> From: 3APA3A [mailto:3APA3A@xxxxxxxxxxxxxxxx] 
> Sent: Friday, August 25, 2006 1:43 PM
> To: Kazennov, Vladimir
> Cc: security-alerts@xxxxxxxxxxxxxx
> Subject: Re: [security-alerts] FW: [SA21587] FreeBSD "ppp" 
> Buffer Overflow Vulnerability
> 
> Dear Kazennov, Vladimir,
> 
> Ну  к  безопасности  почты  оно  слабо,  потому  как  
> во-первых атака на
 Ну, может быть, я не прав в отношении тематики листа, но я посылаю туда 
информацию об уязвимостях общего характера и популярных приложений (не только 
почты).
> канальном  уровне,  а  во-вторых, по-моему, еще и только 
> против клиента.
> Т.е. поломать можно диалапного клиента со стороны провайдера.
 У меня под руками нет FreeBSD - значит, я перепутал ppp и pppd.
 
> 
> --Friday, August 25, 2006, 11:35:32 AM, you wrote to 
> security-alerts@xxxxxxxxxxxxxx:
> 
> >> 
> >> TITLE:
> >> FreeBSD "ppp" Buffer Overflow Vulnerability
> >> 
> >> SECUNIA ADVISORY ID:
> >> SA21587
> >> 
> >> VERIFY ADVISORY:
> >> http://secunia.com/advisories/21587/
> >> 
> >> CRITICAL:
> >> Moderately critical
> >> 
> >> IMPACT:
> >> Exposure of sensitive information, DoS, System access
> >> 
> >> WHERE:
> >> From remote
> >> 
> >> OPERATING SYSTEM:
> >> FreeBSD 6.x
> >> http://secunia.com/product/6778/
> >> FreeBSD 5.x
> >> http://secunia.com/product/1132/
> >> FreeBSD 4.x
> >> http://secunia.com/product/139/
> >> 
> >> DESCRIPTION:
> >> A vulnerability has been reported in FreeBSD, which can be 
> exploited
> >> by malicious people to cause a DoS (Denial of Service), gain
> >> knowledge about potentially sensitive information, and compromise a
> >> vulnerable system.
> >> 
> >> The vulnerability is caused due to boundary errors within the ppp
> >> driver when processing LCP (Link Control Protocol) options 
> and can be
> >> exploited by sending specially crafted LCP packets.
> >> 
> >> The vulnerability has been reported for all FreeBSD releases.
> >> 
> >> SOLUTION:
> >> Update FreeBSD or apply patch.
> >> 
> >> Fixed versions:
> >> 2006-08-23 22:01:44 UTC (RELENG_6, 6.1-STABLE)
> >> 2006-08-23 22:02:25 UTC (RELENG_6_1, 6.1-RELEASE-p4)
> >> 2006-08-23 22:02:52 UTC (RELENG_6_0, 6.0-RELEASE-p10)
> >> 2006-08-23 22:03:55 UTC (RELENG_5, 5.5-STABLE)
> >> 2006-08-23 22:04:28 UTC (RELENG_5_5, 5.5-RELEASE-p3)
> >> 2006-08-23 22:04:58 UTC (RELENG_5_4, 5.4-RELEASE-p17)
> >> 2006-08-23 22:05:49 UTC (RELENG_5_3, 5.3-RELEASE-p32)
> >> 2006-08-23 22:06:08 UTC (RELENG_4, 4.11-STABLE)
> >> 2006-08-23 22:06:40 UTC (RELENG_4_11, 4.11-RELEASE-p20)
> >> 
> >> Patch for FreeBSD 4.x:
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch.asc
> >> 
> >> Patch for FreeBSD 5.3:
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch.asc
> >> 
> >> Patch for FreeBSD 5.4, 5.5, and 6.x:
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch
> >> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch.asc
> >> 
> >> PROVIDED AND/OR DISCOVERED BY:
> >> The vendor credits Martin Husemann and Pavel Cahyna.
> >> 
> >> ORIGINAL ADVISORY:
> >> http://security.freebsd.org/advisories/FreeBSD-SA-06:18.ppp.asc
> >> 
> 
> 
> 
> -- 
> ~/ZARAZA
> Клянусь лысиной пророка Моисея - я тебя сейчас съем. (Твен)
> 
> 




 




Copyright © Lexa Software, 1996-2009.