SB2020051273 - Memory corruption in FreeBSD ipfw



SB2020051273 - Memory corruption in FreeBSD ipfw

Published: May 12, 2020

Security Bulletin ID SB2020051273
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Out-of-bounds read (CVE-ID: CVE-2020-7455)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within libalias(3) library when calculating length in FTP packets. A remote attacker can send specially crafted FTP packet to the system, trigger an out-pf-bounds read and read contents of kernel or natd process memory on the system.


2) Out-of-bounds write (CVE-ID: CVE-2020-7454)

The vulnerability allows a remote attacker to perform a execute arbitrary code on the target system.

The vulnerability exists due to insufficient validation of packet length in libalias(3) library when processing network packets. A remote attacker can send specially crafted packet to the system, trigger our-of-bound read or write error and execute arbitrary code on the target system.

Successful exploitation of vulnerability requires that system is configured to use NAT with ipwf(4).


Remediation

Install update from vendor's website.