Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 209887 (CVE-2008-0177) - KAME IPComp ipcomp6_input remote Dos (CVE-2008-0177)
Summary: KAME IPComp ipcomp6_input remote Dos (CVE-2008-0177)
Status: RESOLVED INVALID
Alias: CVE-2008-0177
Product: Gentoo Security
Classification: Unclassified
Component: Auditing (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.kb.cert.org/vuls/id/110947
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-02-12 17:53 UTC by Robert Buchholz (RETIRED)
Modified: 2008-05-17 20:33 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-02-12 17:53:06 UTC
CVE-2008-0177 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0177):
  The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project
  before 20071201 does not properly check the return value of the m_pulldown
  function, which allows remote attackers to cause a denial of service (system
  crash) via an IPv6 packet with an IPComp header.
Comment 1 Robert Buchholz (RETIRED) gentoo-dev 2008-02-12 17:56:42 UTC
Seems like some BSDs are vulnerable to this.
Comment 2 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-05-06 13:51:11 UTC
Is there anything to do here? BSD herd, please advise.
Comment 3 Alexis Ballier gentoo-dev 2008-05-17 20:09:30 UTC
seems we're fine:

# grep -C 3 m_pulldown /usr/src/sys/netinet6/ipcomp_input.c
		goto fail;
	}

	md = m_pulldown(m, off, sizeof(*ipcomp), NULL);
	if (!md) {
		m = NULL;	/* already freed */
		ipseclog((LOG_DEBUG, "IPv4 IPComp input: assumption failed "
--
	m = *mp;
	off = *offp;

	md = m_pulldown(m, off, sizeof(*ipcomp), NULL);
	if (!md) {
		m = NULL;	/* already freed */
		ipseclog((LOG_DEBUG, "IPv6 IPComp input: assumption failed "


and:
http://security.freebsd.org/advisories/FreeBSD-SA-08:04.ipsec.asc

which refers to:
http://security.freebsd.org/patches/SA-08:04/ipsec.patch

Index: sys/netinet6/ipcomp_input.c
===================================================================
RCS file: /home/ncvs/src/sys/netinet6/Attic/ipcomp_input.c,v
retrieving revision 1.7.4.1
diff -u -r1.7.4.1 ipcomp_input.c
--- sys/netinet6/ipcomp_input.c	31 Jan 2005 23:26:39 -0000	1.7.4.1
+++ sys/netinet6/ipcomp_input.c	13 Feb 2008 13:44:24 -0000
@@ -258,7 +258,7 @@
 	off = *offp;
 
 	md = m_pulldown(m, off, sizeof(*ipcomp), NULL);
-	if (!m) {
+	if (!md) {
 		m = NULL;	/* already freed */
 		ipseclog((LOG_DEBUG, "IPv6 IPComp input: assumption failed "
 		    "(pulldown failure)\n"));


Corrected:      2008-02-14 11:49:39 UTC (RELENG_5, 5.5-STABLE)
                2008-02-14 11:50:28 UTC (RELENG_5_5, 5.5-RELEASE-p19)
CVE Name:       CVE-2008-0177


so that's only freebsd 5 :)
Comment 4 Pierre-Yves Rofes (RETIRED) gentoo-dev 2008-05-17 20:33:27 UTC
ok, so closing as INVALID. Feel free to reopen if I missed something.