BSD fwdev.c integer overflow
|bsd-fwdev-integer-overflow (30347)||Medium Risk|
Multiple BSD systems are vulnerable to an integer overflow in the fw_ioctl() function of fwdev.c. A local attacker could send specially-crafted arguments to the fw_ioctl() function to read the system memory and obtain sensitive information.
Refer to FreeBSD-SA-06:25.kmem for patch, upgrade, or workaround information. See References.
For other distributions:
Contact your vendor for upgrade or patch information.
- BSDaemon Advisory 15/11/2006 : FreeBSD/NetBSD/TrustedBSD*/DragonFlyBSD all versions FireWire IOCTL kernel integer overflow information disclousure.
- FreeBSD-SA-06:25.kmem : Kernel memory disclosure in firewire(4).
- MidnightBSD Web site: MidnightBSD Project.
- TrustedBSD Web site: TrustedBSD - Home.
- BID-21089: Multiple BSD Vendor FireWire IOCTL Local Integer Overflow Vulnerability
- CVE-2006-6013: Integer signedness error in the fw_ioctl (FW_IOCTL) function in the FireWire (IEEE-1394) drivers (dev/firewire/fwdev.c) in various BSD kernels, including DragonFlyBSD, FreeBSD 5.5, MidnightBSD 0.1-CURRENT before 20061115, NetBSD-current before 20061116, NetBSD-4 before 20061203, and TrustedBSD, allows local users to read arbitrary memory contents via certain negative values of crom_buf->len in an FW_GCROM command. NOTE: this issue has been labeled as an integer overflow, but it is more like an integer signedness error.
- OSVDB ID: 30291: Multiple BSD FireWire fwdev.c fw_ioctl() Function Local Overflow
- SA22917: FreeBSD "fw_ioctl()" Integer Overflow Vulnerability
- SECTRACK ID: 1017344: BSD FireWire Driver fw_ioctl() Integer Signedness Error Lets Local Users Read Kernel Memory
- DragonFlyBSD DragonFly BSD
- FreeBSD FreeBSD
- MidnightBSD Project MidnightBSD
- NetBSD NetBSD
- TrustedBSD Project TrustedBSD
Nov 15, 2006
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.