SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   NetBSD Vendors:   NetBSD
NetBSD Compatibility Layer Bugs Let Local Users Deny Service and Gain Elevated Privileges
SecurityTracker Alert ID:  1035672
SecurityTracker URL:  http://securitytracker.com/id/1035672
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 25 2016
Impact:   Denial of service via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0 - 6.0.5, 6.1 - 6.1.4, 7.0
Description:   Several vulnerabilities were reported in NetBSD. A local user can cause denial of service conditions on the target system. A local user can gain system privileges on the target system.

A local user can trigger an input validation flaw in the Digital UNIX (OSF/1) compatibility sendmsg() system call to cause the target kernel to crash.

A local user can trigger a memory leak in the NetBSD 32bit compatibility sendmsg() system call to consume all available memory resources on the target system and cause a kernel panic.

A local user can exploit a logic error in the NetBSD 32bit compatibility ioctl() system call to overwrite kernel heap memory and gain elevated privileges.

Maxime Villard reported these vulnerabilities.

Impact:   A local user can cause the target system to crash.

A local user can obtain kernel-level privileges on the target system.

Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-004.txt.asc

Vendor URL:  ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-004.txt.asc (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC