[Midnightbsd-cvs] src: pf.c: Correct the following defect in PF, originally reported to
laffer1 at midnightbsd.org
laffer1 at midnightbsd.org
Wed Apr 15 15:22:32 EDT 2009
Log Message:
-----------
Correct the following defect in PF, originally reported to OpenBSD and later in our #midnightbsd chatroom:
Author : Rembrandt
Date : 2009-04-09
Affected Software: OpenBSD Kernel
Affected OS : OpenBSD 4.{3,4,5}, OpenBSD-current
Propably older versions are affected as well
Type : Denial of Service
OSVDB :
Milw0rm : 8406
CVE :
ISS X-Force: :
BID : 34482
Secunia : 34676
VUPEN ID :
Trying to fix it responsible and get in contact with the vendor:
-- OpenBSD --
Contacted 2009-04-09 15:35 GMT+1
Patch avaiable 2009-04-11 23:43 UTC
We received no response nor a notification about an upcoming patch by
the developers.
-- END --
OpenBSDs PF firewall in OpenBSD 4.3 up to OpenBSD-current is prone to a
remote Denial of Service during a null pointer dereference in relation with
special crafted IP datagrams. If the firewall handles such a packet the kernel
panics.
Steps to reproduce:
If you are behind a OpenBSD firewall this nmap scan should trigger the problem
and crash your firewall device:
nmap -sO $some_host_so_that_the_firewall_handles_the_packets
For more informations please do read the patch issued by OpenBSD.
Patches and Workaround:
Patches are provided for OpenBSD 4.3, 4.4, 4.5 (upcoming, release 1st of may)
and OpenBSD-current (via CVS only) and are avaiable at the errata website.
The developers provide hints for a workaround at their errata website too.
Kind regards,
Rembrandt
Modified Files:
--------------
src/sys/contrib/pf/net:
pf.c (r1.3 -> r1.4)
(http://cvsweb.midnightbsd.org/src/sys/contrib/pf/net/pf.c?r1=1.3&r2=1.4)
More information about the Midnightbsd-cvs
mailing list