FreeBSD Security Advisory FreeBSD-SA-15:02.kmem
Gary Palmer
gpalmer at freebsd.org
Thu Jan 29 14:31:14 UTC 2015
On Fri, Jan 30, 2015 at 01:20:56AM +1100, Ian Smith wrote:
> On Wed, 28 Jan 2015 17:01:50 -0800, jungle Boogie wrote:
> > Hi Nick,
> > On Jan 28, 2015 4:56 PM, "Nick Frampton" <nick.frampton at akips.com> wrote:
> > >
> > > On 29/01/15 08:46, Joe Holden wrote:
> > >>
> > >> Really, how many SCTP users are there om the wild... maybe one?
> > >>
> > >> It shouldn't be in GENERIC at the very least!
> > >
> > >
> > > We use Netflow over SCTP in our network monitoring product, so it would
> > be a pain to have to build a custom kernel.
> >
> > But also a pain to have an exploit when it could be prevented.
>
> Are you vulnerable to an SCTP exploit if you're not using SCTP?
>From one of the advisories (FreeBSD-SA-15:02.kmem):
-- QUOTE --
An unprivileged process can read or modify 16-bits of memory which
belongs to the kernel. This smay lead to exposure of sensitive
information or allow privilege escalation.
-- ENDQUOTE --
So even if you don't use SCTP, if someone got a shell on your box
they could potentially use SCTP to get root or modify kernel memory
to break out of a jail, etc.
In other words, you don't necessarily need to use SCTP to be affected
by vulnerabilities in it.
Regards,
Gary
More information about the freebsd-security
mailing list