[FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-14:01.bsnmpd

Xin Li delphij at delphij.net
Tue Jan 21 23:24:58 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 1/16/14, 12:41 PM, Jeremie Le Hen wrote:
> Hi,
> 
> On Tue, Jan 14, 2014 at 08:11:08PM +0000, FreeBSD Security
> Advisories wrote:
>> 
>> II.  Problem Description
>> 
>> The bsnmpd(8) daemon is prone to a stack-based buffer-overflow
>> when it has received a specifically crafted GETBULK PDU request.
>> 
>> III. Impact
>> 
>> This issue could be exploited to execute arbitrary code in the
>> context of the service daemon, or crash the service daemon,
>> causing a denial-of-service.
>> 
>> IV.  Workaround
>> 
>> No workaround is available, but systems not running bsnmpd(8) are
>> not vulnerable.
> 
> We are supposed to have SSP in all binaries that should prevent 
> exploitations from this kind of bugs.  I am curious why it hasn't
> been mentioned: is it because it didn't work as expected (which
> would require some investigation), or is it just an omission?

Yes, it does work and will abort the process (results in a Denial of
Service) rather than allowing the execution.

Cheers,

-----BEGIN PGP SIGNATURE-----
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=DBA7
-----END PGP SIGNATURE-----


More information about the freebsd-security mailing list