Vigil@nce: Linux kernel, memory leak via AppleTalk and IPDDP
September 2009 by Vigil@nce
When appletalk and ipddp modules are loaded, a local attacker can
generate a denial of service.
Severity: 1/4
Consequences: denial of service of computer
Provenance: user shell
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 14/09/2009
IMPACTED PRODUCTS
– Linux kernel
– Red Hat Enterprise Linux
DESCRIPTION OF THE VULNERABILITY
The IPDDP protocol is used to encapsulate IP packets in an
AppleTalk session. Associated devices are named ipddp0, ipddp1,
etc.
When a local user uses an unknown device name (such as ipddp9),
the handle_ip_over_ddp() function of the net/appletalk/ddp.c file
does not call kfree_skb() to free memory. A local attacker can
thus progressively force the kernel to use all the available
memory.
When appletalk and ipddp modules are loaded, a local attacker can
therefore generate a denial of service.
CHARACTERISTICS
Identifiers: 522331, CVE-2009-2903, VIGILANCE-VUL-9021
http://vigilance.fr/vulnerability/Linux-kernel-memory-leak-via-AppleTalk-and-IPDDP-9021