FreeBSD-SA-26:05.route

  • Thread starter Thread starter FreeBSD Security
  • Start date Start date
Status
Not open for further replies.
F

FreeBSD Security

Guest
The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow.

In practice, this overflow immediately overwrites the canary for the rtsock_msg_buffer() stack frame, resulting in a panic once the function
returns.
Original article here.
Consider this when replying.



Continue reading...
 
Status
Not open for further replies.
Back
Top