Vigil@nce - NetBSD: denial of service via Socket tcpdrop
December 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
A local attacker can create a TCP socket and use tcpdrop of
NetBSD, in order to trigger a denial of service.
– Impacted products: NetBSD
– Severity: 2/4
– Creation date: 27/11/2013
DESCRIPTION OF THE VULNERABILITY
The tcpdrop utility is used to terminate a TCP session. Users are
only allowed to end their own TCP sessions.
When a TCP session is established, the kernel adds entries in the
connection table, and prepares other structures. However, if a
tcpdrop is run before the kernel has finished to prepare
structures, and assertion error occurs, or a NULL pointer is
dereferenced.
A local attacker can therefore create a TCP socket and use tcpdrop
of NetBSD, in order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/NetBSD-denial-of-service-via-Socket-tcpdrop-13836