Vigil@nce - OpenBSD: information disclosure via exec_elf.c
May 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can read a memory fragment with exec_elf.c of
OpenBSD, in order to obtain sensitive information, or to stop the
kernel.
Impacted products: OpenBSD
Severity: 1/4
Creation date: 04/05/2015
DESCRIPTION OF THE VULNERABILITY
The OpenBSD kernel executes programs in ELF format.
However, the load_file() function of the sys/kern/exec_elf.c file
loads a memory area too large before returning it to the user.
A local attacker can therefore read a memory fragment with
exec_elf.c of OpenBSD, in order to obtain sensitive information,
or to stop the kernel.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/OpenBSD-information-disclosure-via-exec-elf-c-16797