SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Storage)  >   Apple Time Capsule Vendors:   Apple
(Apple Issues Fix for Time Capsule) FreeBSD IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases
SecurityTracker Alert ID:  1021815
SecurityTracker URL:  http://securitytracker.com/id/1021815
CVE Reference:   CVE-2008-2476   (Links to External Site)
Date:  Mar 6 2009
Impact:   Disclosure of system information, Disclosure of user information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): firmware prior to 7.4.1
Description:   A vulnerability was reported in the FreeBSD IPv6 Neighbor Discovery Protocol. A remote user can modify routing data for a target router in certain cases. Apple Time Capsule is affected.

A remote user on a physical network of an IPv6 router can spoof Neighbor Discovery messages to update routing information for a target router on a different physical network adjacent to the IPv6 router. The remote user can exploit this to deny service or access network traffic from the target router.

David Miles reported this vulnerability.

Impact:   A remote user can modify routing data for a target router in certain cases to deny service or redirect and access network traffic.
Solution:   Apple has released a fix (firmware 7.4.1) for Time Capsule, which is affected by this vulnerability.

The Apple advisory is available at:

http://support.apple.com/kb/HT3467

Cause:   Authentication error

Message History:   This archive entry is a follow-up to the message listed below.
Oct 2 2008 FreeBSD IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases



 Source Message Contents

Subject:  APPLE-SA-2009-03-05 Time Capsule and AirPort Base Station


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2009-03-05 Time Capsule and AirPort Base Station (802.11n*)
Firmware 7.4.1

Time Capsule and AirPort Base Station (802.11n*) Firmware 7.4.1 is
now available and addresses the following:

CVE-ID: CVE-2008-2476
Available for: AirPort Extreme Base Station with 802.11n*,
AirPort Express Base Station with 802.11n*, Time Capsule
Impact: A remote user may be able to cause a denial of service
attack, observe private network traffic, or inject forged packets
Description: The IPv6 Neighbor Discovery Protocol implementation
does not validate the origin of Neighbor Discovery messages. By
sending a maliciously crafted message, a remote user may cause a
denial of service, observe private network traffic, or inject forged
packets. This update addresses the issue by performing additional
validation of Neighbor Discovery messages.

CVE-ID: CVE-2008-0473
Available for: AirPort Extreme Base Station with 802.11n*,
AirPort Express Base Station with 802.11n*, Time Capsule
Impact: A user on the local network may be able to cause an
unexpected device shutdown
Description: An out-of-bounds memory access issue exists in the
handling of PPPoE discovery packets. By sending a maliciously crafted
PPPoE discovery packet, a remote user may be able to cause an
unexpected device shutdown. This update addresses the issue
through improved bounds checking.

CVE-ID: CVE-2008-3530
Available for: AirPort Extreme Base Station with 802.11n*,
AirPort Express Base Station with 802.11n*, Time Capsule
Impact: A remote user may be able to cause an unexpected device
shutdown
Description: When IPv6 support is enabled, IPv6 nodes use ICMPv6 to
report errors encountered while processing packets. An implementation
issue in the handling of incoming ICMPv6 "Packet Too Big" messages
may cause an unexpected device shutdown. This update addresses
the issue through improved handling of ICMPv6 messages.


Installation note for Firmware version 7.4.1

Firmware version 7.4.1 is installed into Time Capsule or AirPort
Base Station with 802.11n* via AirPort Utility, provided with
the device.

It is recommended that AirPort Utility 5.4.1 be installed before
upgrading to Firmware version 7.4.1.

AirPort Utility 5.4.1 may be obtained through Apple's Software
Download site: http://www.apple.com/support/downloads/

(*) Based on an IEEE 802.11n draft specification

Information will also be posted to the Apple Security Updates
web site:  http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJJrzcMAAoJEHkodeiKZIkBs5UIALDK3nyGyd/9VKlhhbyxARTs
2Q2FW/nQTqst90gqJDXVmn6X3iqP7Za9wq2gUPSjOsyMz4hEQxJe3RTmwQDp21lI
fDnW+qbHMgK+kJ4i7c5ZX1FfaRuETPX5nurqKvpRmEJDP2SshWgjaDcw8VE9JBty
ypfyOsq+Xmp84IjhGaokw4Ug/EPj6aOF4yT8OPcsAE6GwPBlg9chZvLelAVkOcCE
/+CUIb9o5OjLBXjyepL05clkUXGULzBcOGAcB6At6WlwzWr/QEIPWliWDbEYeo6X
Y8FlrMXvW9+rWuv95qF6vEGfh0VtV1BveKAZPMVoLcW0jI5zHYh7GBkhjcS0F98=
=chDp
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC