[10469] in bugtraq

home help back first fref pref prev next nref lref last post

Re: KKIS.05051999.003b

daemon@ATHENA.MIT.EDU (Kevin Day)
Fri May 7 13:46:28 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id: <199905061910.OAA23901@home.dragondata.com>
Date: 	Thu, 6 May 1999 14:10:49 -0500
Reply-To: Kevin Day <toasty@HOME.DRAGONDATA.COM>
From: Kevin Day <toasty@HOME.DRAGONDATA.COM>
X-To:         lluzar@SECURITY.KKI.PL
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.4.10.9905051119380.17696-200000@nova.kki.krakow.pl>
              from Lukasz Luzar at "May 5, 1999 11:26:21 am"

> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Informations ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>  Report title        : Security problem with sockets in FreeBSD's
>                        implementation of UNIX-domain protocol family.
>  Problem found by    : Lukasz Luzar (lluzar@security.kki.pl)
>  Report created by   : Robert Pajak (shadow@security.kki.pl)
>                        Lukasz Luzar (lluzar@security.kki.pl)
>  Raport published    : 5th May 1999
>  Raport code         : KKIS.05051999.003.b
>  Systems affected    : FreeBSD-3.0 and maybe 3.1,
>  Archive             : http://www.security.kki.pl/advisories/
>  Risk level          : high
>
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[ Description ]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>   As you know, "The UNIX-domain protocol family is a collection of protocols
>  that provides local interprocess communication through the normal socket
>  mechanism. It supports the SOCK_STREAM and SOCK_DGRAM soceket types and uses
>  filesystem pathnames for addressing."
>  The SOCK_STREAM sockets also supports the communication of UNIX file
>  descriptors through the use of functions sendmsg() and recvmsg().
>   While testing UNIX-domain protocols, we have found probable bug in
>  FreeBSD's implementation of this mechanism.
>   When we had run attached example on FreeBSD-3.0 as local user, system
>  had crashed imediatelly with error "Supervisor read, page not present"
>  in kernel mode.
>

Here's my testing so far:

2.2.2 - Vulnerable
2.2.6 - Vulnerable
2.2.8 - Vulnerable
3.1-RELEASE - Ran 15 minutes, no crash.


Kevin Day
DragonData

home help back first fref pref prev next nref lref last post