[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2323-1 radvd -- several issues

ID: oval:org.secpod.oval:def:600654Date: (C)2012-01-30   (M)2023-11-09
Class: PATCHFamily: unix




Multiple security issues were discovered by Vasiliy Kulikov in radvd, an IPv6 Router Advertisement daemon: CVE-2011-3602 set_interface_var function doesn"t check the interface name, which is chosen by an unprivileged user. This could lead to an arbitrary file overwrite if the attacker has local access, or specific files overwrites otherwise. CVE-2011-3604 process_ra function lacks multiple buffer length checks which could lead to memory reads outside the stack, causing a crash of the daemon. CVE-2011-3605 process_rs function calls mdelay unconditionnally when running in unicast-only mode. As this call is in the main thread, that means all request processing is delayed . An attacked could flood the daemon with router solicitations in order to fill the input queue, causing a temporary denial of service . Note: upstream and Debian default is to use anycast mode.

Platform:
Debian 5.0
Debian 6.0
Product:
radvd
Reference:
DSA-2323-1
CVE-2011-3602
CVE-2011-3604
CVE-2011-3605
CVE    3
CVE-2011-3605
CVE-2011-3602
CVE-2011-3604
CPE    3
cpe:/o:debian:debian_linux:5.x
cpe:/o:debian:debian_linux:6.x
cpe:/a:litech:radvd

© SecPod Technologies