ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA21587] FreeBSD "ppp" Buffer Overflow Vulnerability



> 
> TITLE:
> FreeBSD "ppp" Buffer Overflow Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA21587
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/21587/
> 
> CRITICAL:
> Moderately critical
> 
> IMPACT:
> Exposure of sensitive information, DoS, System access
> 
> WHERE:
> From remote
> 
> OPERATING SYSTEM:
> FreeBSD 6.x
> http://secunia.com/product/6778/
> FreeBSD 5.x
> http://secunia.com/product/1132/
> FreeBSD 4.x
> http://secunia.com/product/139/
> 
> DESCRIPTION:
> A vulnerability has been reported in FreeBSD, which can be exploited
> by malicious people to cause a DoS (Denial of Service), gain
> knowledge about potentially sensitive information, and compromise a
> vulnerable system.
> 
> The vulnerability is caused due to boundary errors within the ppp
> driver when processing LCP (Link Control Protocol) options and can be
> exploited by sending specially crafted LCP packets.
> 
> The vulnerability has been reported for all FreeBSD releases.
> 
> SOLUTION:
> Update FreeBSD or apply patch.
> 
> Fixed versions:
> 2006-08-23 22:01:44 UTC (RELENG_6, 6.1-STABLE)
> 2006-08-23 22:02:25 UTC (RELENG_6_1, 6.1-RELEASE-p4)
> 2006-08-23 22:02:52 UTC (RELENG_6_0, 6.0-RELEASE-p10)
> 2006-08-23 22:03:55 UTC (RELENG_5, 5.5-STABLE)
> 2006-08-23 22:04:28 UTC (RELENG_5_5, 5.5-RELEASE-p3)
> 2006-08-23 22:04:58 UTC (RELENG_5_4, 5.4-RELEASE-p17)
> 2006-08-23 22:05:49 UTC (RELENG_5_3, 5.3-RELEASE-p32)
> 2006-08-23 22:06:08 UTC (RELENG_4, 4.11-STABLE)
> 2006-08-23 22:06:40 UTC (RELENG_4_11, 4.11-RELEASE-p20)
> 
> Patch for FreeBSD 4.x:
> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp4x.patch.asc
> 
> Patch for FreeBSD 5.3:
> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp53.patch.asc
> 
> Patch for FreeBSD 5.4, 5.5, and 6.x:
> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch
> http://security.FreeBSD.org/patches/SA-06:18/ppp.patch.asc
> 
> PROVIDED AND/OR DISCOVERED BY:
> The vendor credits Martin Husemann and Pavel Cahyna.
> 
> ORIGINAL ADVISORY:
> http://security.freebsd.org/advisories/FreeBSD-SA-06:18.ppp.asc
> 




 




Copyright © Lexa Software, 1996-2009.