CVE-2005-2019
CVSS5.0
发布时间 :2005-07-05 00:00:00
修订时间 :2008-09-05 16:50:40
NMCOPS    

[原文]ipfw in FreeBSD 5.4, when running on Symmetric Multi-Processor (SMP) or Uni Processor (UP) systems with the PREEMPTION kernel option enabled, does not sufficiently lock certain resources while performing table lookups, which can cause the cache results to be corrupted during multiple concurrent lookups, allowing remote attackers to bypass intended access restrictions.


[CNNVD]FreeBSD IPFW 绕过访问控制漏洞(CNNVD-200507-014)

        FreeBSD是一种运行在Intel平台上,可以自由使用的Unix系统。
        运行于SMP或UP且启用PREEMPTION时,FreeBSD 5.4中的ipfw存在绕过检测漏洞。
        由于在进行多个并行的表查询时,不能充分的锁定当前资源,缓存的结果可能被破坏,将导致出现不正确的匹配。这使得远程攻击者有可能绕过访问控制限制。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2019
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2019
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200507-014
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:13.ipfw.asc
(VENDOR_ADVISORY)  FREEBSD  FreeBSD-SA-05:13

- 漏洞信息

FreeBSD IPFW 绕过访问控制漏洞
中危 其他
2005-07-05 00:00:00 2005-10-20 00:00:00
远程  
        FreeBSD是一种运行在Intel平台上,可以自由使用的Unix系统。
        运行于SMP或UP且启用PREEMPTION时,FreeBSD 5.4中的ipfw存在绕过检测漏洞。
        由于在进行多个并行的表查询时,不能充分的锁定当前资源,缓存的结果可能被破坏,将导致出现不正确的匹配。这使得远程攻击者有可能绕过访问控制限制。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:13.ipfw.asc

- 漏洞信息 (F38379)

FreeBSD-SA-05-13.ipfw.txt (PacketStormID:F38379)
2005-07-01 00:00:00
 
advisory,kernel
freebsd
CVE-2005-2019
[点击下载]

FreeBSD Security Advisory FreeBSD-SA-05:13 - The ipfw tables lookup code caches the result of the last query. The kernel may process multiple packets concurrently, performing several concurrent table lookups. Due to an insufficient locking, a cached result can become corrupted that could cause some addresses to be incorrectly matched against a lookup table.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=============================================================================
FreeBSD-SA-05:13.ipfw                                       Security Advisory
                                                          The FreeBSD Project

Topic:          ipfw packet matching errors with address tables

Category:       core
Module:         netinet
Announced:      2005-06-29
Credits:        Max Laier
Affects:        FreeBSD 5.4-RELEASE
Corrected:      2005-06-29 21:38:48 UTC (RELENG_5, 5.4-STABLE)
                2005-06-29 21:41:03 UTC (RELENG_5_4, 5.4-RELEASE-p3)
CVE Name:       CAN-2005-2019

For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
<URL:http://www.freebsd.org/security/>.

I.   Background

ipfw(8) is a system facility which allows IP packet filtering,
redirecting, and traffic accounting.  ipfw lookup tables are a way to
specify many IP addresses which can be used for packet matching in an
efficient manner.

II.  Problem Description

The ipfw tables lookup code caches the result of the last query.  The
kernel may process multiple packets concurrently, performing several
concurrent table lookups.  Due to an insufficient locking, a cached
result can become corrupted that could cause some addresses to be
incorrectly matched against a lookup table.

III. Impact

When lookup tables are used with ipfw, packets may on very rare
occasions incorrectly match a lookup table.  This could result in a
packet being treated contrary to the defined packet filtering ruleset.
For example, a packet may be allowed to pass through when it should
have been discarded.

The problem can only occur on Symmetric Multi-Processor (SMP) systems,
or on Uni Processor (UP) systems with the PREEMPTION kernel option
enabled (not the default).

IV.  Workaround

a) Do not use lookup tables.

OR

b) Disable concurrent processing of packets in the network stack by
   setting the "debug.mpsafenet=0" tunable:

   # echo "debug.mpsafenet=0" >> /boot/loader.conf

V.   Solution

Perform one of the following:

1) Upgrade your vulnerable system to 5-STABLE, or to the RELENG_5_4
security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 5.4
systems.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:13/ipfw.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:13/ipfw.patch.asc

b) Apply the patch.

# cd /usr/src
# patch < /path/to/patch

c) Recompile your kernel as described in
<URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the
system.

VI.  Correction details

The following list contains the revision numbers of each file that was
corrected in FreeBSD.

Branch                                                           Revision
  Path
- -------------------------------------------------------------------------
RELENG_5
  src/sys/netinet/ip_fw2.c                                      1.70.2.14
RELENG_5_4
  src/UPDATING                                            1.342.2.24.2.12
  src/sys/conf/newvers.sh                                   1.62.2.18.2.8
  src/sys/netinet/ip_fw2.c                                  1.70.2.10.2.1
- -------------------------------------------------------------------------

VII. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2019

The latest revision of this advisory is available at
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:13.ipfw.asc
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFCwxeeFdaIBMps37IRAkOAAJ0cCLsoqdUsfTfPNxocl1/TSORXnwCeIq0L
wM2hw6x90lSyoEVYnxfAg2s=
=khtV
-----END PGP SIGNATURE-----
    

- 漏洞信息

17676
FreeBSD ipfw Cached Entry Packet Matching Issue
Remote / Network Access Infrastructure
Loss of Integrity
Exploit Public

- 漏洞描述

FreeBSD ipfw on Symmetric Multi-Processor (SMP) systems and Uni Processor (UP) systems compiled with the PREEMPTION kernel option contains a flaw that may allow a malicious user to bypass ipfw lookup table rulesets. The issue is triggered when the kernel performs concurrent ipfw table lookups using cached results that have become corrupted due to insufficient locking. This could result in an incoming packet being treated contrary to a defined packet filtering ruleset. It is possible that the flaw may allow unauthorized access.

- 时间线

2005-06-29 Unknow
2005-06-29 Unknow

- 解决方案

FreeBSD has released a patch to address this vulnerability. It is also possible to correct the flaw by implementing one of the following workarounds: stop using lookup tables or disable concurrent processing of packets in the network stack by setting the "debug.mpsafenet=0" tunable: # echo "debug.mpsafenet=0" >> /boot/loader.conf

- 相关参考

- 漏洞作者

- 漏洞信息

FreeBSD IPFW Address Table Lookup Atomicity Error Firewall Rule Bypass Vulnerability
Atomicity Error 14102
Yes No
2005-06-29 12:00:00 2009-07-12 04:06:00
Discovery of this issue is credited to Max Laier.

- 受影响的程序版本

FreeBSD FreeBSD 5.4 -RELEASE

- 漏洞讨论

FreeBSD IPFW is prone to an atomicity error that might result in erroneous lookup table matching under certain circumstances. Reports indicate the issue exists on SMP (Symmetric Multi-Processor) based platforms, or on UP (Uni Processor) platforms that have a system kernel configured with 'PREEMPTION' functionality enabled. (Note: This is not a default configuration).

This issue may be leveraged to aid in attacks launched against target computers that are protected by the affected firewall.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

The vendor has released an advisory (FreeBSD-SA-05:13.ipfw) and fixes to address this issue.


FreeBSD FreeBSD 5.4 -RELEASE

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站