>
> TITLE:
> FreeBSD "ppp" Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA21587
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Moderately critical
>
> IMPACT:
> Exposure of sensitive information, DoS, System access
>
> WHERE:
> From remote
>
> OPERATING SYSTEM:
> FreeBSD 6.x
>
> FreeBSD 5.x
>
> FreeBSD 4.x
>
>
> DESCRIPTION:
> A vulnerability has been reported in FreeBSD, which can be exploited
> by malicious people to cause a DoS (Denial of Service), gain
> knowledge about potentially sensitive information, and compromise a
> vulnerable system.
>
> The vulnerability is caused due to boundary errors within the ppp
> driver when processing LCP (Link Control Protocol) options and can be
> exploited by sending specially crafted LCP packets.
>
> The vulnerability has been reported for all FreeBSD releases.
>
> SOLUTION:
> Update FreeBSD or apply patch.
>
> Fixed versions:
> 2006-08-23 22:01:44 UTC (RELENG_6, 6.1-STABLE)
> 2006-08-23 22:02:25 UTC (RELENG_6_1, 6.1-RELEASE-p4)
> 2006-08-23 22:02:52 UTC (RELENG_6_0, 6.0-RELEASE-p10)
> 2006-08-23 22:03:55 UTC (RELENG_5, 5.5-STABLE)
> 2006-08-23 22:04:28 UTC (RELENG_5_5, 5.5-RELEASE-p3)
> 2006-08-23 22:04:58 UTC (RELENG_5_4, 5.4-RELEASE-p17)
> 2006-08-23 22:05:49 UTC (RELENG_5_3, 5.3-RELEASE-p32)
> 2006-08-23 22:06:08 UTC (RELENG_4, 4.11-STABLE)
> 2006-08-23 22:06:40 UTC (RELENG_4_11, 4.11-RELEASE-p20)
>
> Patch for FreeBSD 4.x:
>
>
>
> Patch for FreeBSD 5.3:
>
>
>
> Patch for FreeBSD 5.4, 5.5, and 6.x:
>
>
>
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Martin Husemann and Pavel Cahyna.
>
> ORIGINAL ADVISORY:
>
>