Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 743748 - (CVE-2011-3601) CVE-2011-3601 radvd: privilege escalation flaw in process_ra()
CVE-2011-3601 radvd: privilege escalation flaw in process_ra()
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20111004,reported=2...
: Security
Depends On: 744116
Blocks: 743759
  Show dependency treegraph
 
Reported: 2011-10-05 17:36 EDT by Vincent Danen
Modified: 2016-06-10 17:40 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-06-10 17:40:57 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2011-10-05 17:36:56 EDT
A privilege escalation flaw was found in radvd, due to a buffer overflow in the process_ra() function.  ND_OPT_DNSSL_INFORMATION option parsing "label_len" was not checked for negative values, leading to a "suffix" buffer overflow which can lead to privilege escalation, at least if radvd is compiled without GCC's stack protection. If radvd is invoked without privilege separation (the -u option), this can lead to an escalation to root privileges.  Note: Red Hat Enterprise Linux starts radvd by default with the unprivileged user. (CVE-2011-3601)

This is corrected in upstream git [1].

[1] https://github.com/reubenhwk/radvd/commit/9dfaaaf740ce784541e76e68de4ae04dce2c0921

Note: radvd is compiled with GCC stack protection on Red Hat Enterprise Linux 5 and later.

Acknowledgements:

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
Comment 3 Huzaifa S. Sidhpurwala 2011-10-06 04:31:06 EDT
The version of radvd shipped with Red Hat Enterprise Linux 4, 5 and 6 does not have support for IPv6 Router Advertisement Options for DNS Configuration. 

Statement:

Not Vulnerable. This issue does not affect the version of radvd package as shipped with Red Hat Enterprise Linux 4, 5 and 6.
Comment 4 Huzaifa S. Sidhpurwala 2011-10-06 04:31:42 EDT
This issue affects the version of radvd as shipped with Fedora 14 and 15.
Comment 5 Huzaifa S. Sidhpurwala 2011-10-07 01:28:51 EDT
Public via:
http://thread.gmane.org/gmane.comp.security.oss.general/5973
Comment 6 Huzaifa S. Sidhpurwala 2011-10-07 01:36:43 EDT
Created radvd tracking bugs for this issue

Affects: fedora-all [bug 744116]
Comment 7 Fedora Update System 2011-10-26 23:55:07 EDT
radvd-1.8.2-2.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2011-10-26 23:56:37 EDT
radvd-1.8.2-2.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2011-10-28 13:22:19 EDT
radvd-1.8.2-2.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2011-10-28 13:23:08 EDT
radvd-1.8.2-2.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2011-11-04 21:31:02 EDT
radvd-1.8.2-2.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.