NetBSD TCP Socket shutdown Resource DoS

2002-09-16T00:00:00
ID OSVDB:20775
Type osvdb
Reporter Sean Boudreau()
Modified 2002-09-16T00:00:00

Description

Vulnerability Description

NetBSD contains a flaw that may allow a remote denial of service. The issue is triggered when the sbappend() function fails to consult the SS_CANTRCVMORE flag on the TCP socket properly, resulting in excessive kernel memory consumption and a loss of availability for the platform.

Solution Description

Upgrade to version 1.6 after the correction date or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

NetBSD contains a flaw that may allow a remote denial of service. The issue is triggered when the sbappend() function fails to consult the SS_CANTRCVMORE flag on the TCP socket properly, resulting in excessive kernel memory consumption and a loss of availability for the platform.

References:

Vendor Specific News/Changelog Entry: http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=18185 Vendor Specific Advisory URL