Vigil@nce - NetBSD: denial of service via BPF
September 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can define a short BPF buffer on NetBSD, in order
to trigger a denial of service.
Impacted products: NetBSD
Severity: 1/4
Creation date: 11/09/2013
DESCRIPTION OF THE VULNERABILITY
A BPF (Berkeley Packet Filter) filter defines the type of packets
to capture.
The BIOCSBLEN ioctl changes the size of the capture buffer.
However, the kernel accepts a size which is shorter than the size
of headers which are stored inside. The kernel then tries to copy
large data, which panics the system.
A local attacker can therefore define a short BPF buffer on
NetBSD, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/NetBSD-denial-of-service-via-BPF-13414