Bug 743748 (CVE-2011-3601) - CVE-2011-3601 radvd: privilege escalation flaw in process_ra()
Summary: CVE-2011-3601 radvd: privilege escalation flaw in process_ra()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2011-3601
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 744116
Blocks: 743759
TreeView+ depends on / blocked
 
Reported: 2011-10-05 21:36 UTC by Vincent Danen
Modified: 2023-05-11 18:12 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-10 21:40:57 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2011-10-05 21:36:56 UTC
A privilege escalation flaw was found in radvd, due to a buffer overflow in the process_ra() function.  ND_OPT_DNSSL_INFORMATION option parsing "label_len" was not checked for negative values, leading to a "suffix" buffer overflow which can lead to privilege escalation, at least if radvd is compiled without GCC's stack protection. If radvd is invoked without privilege separation (the -u option), this can lead to an escalation to root privileges.  Note: Red Hat Enterprise Linux starts radvd by default with the unprivileged user. (CVE-2011-3601)

This is corrected in upstream git [1].

[1] https://github.com/reubenhwk/radvd/commit/9dfaaaf740ce784541e76e68de4ae04dce2c0921

Note: radvd is compiled with GCC stack protection on Red Hat Enterprise Linux 5 and later.

Acknowledgements:

Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.

Comment 3 Huzaifa S. Sidhpurwala 2011-10-06 08:31:06 UTC
The version of radvd shipped with Red Hat Enterprise Linux 4, 5 and 6 does not have support for IPv6 Router Advertisement Options for DNS Configuration. 

Statement:

Not Vulnerable. This issue does not affect the version of radvd package as shipped with Red Hat Enterprise Linux 4, 5 and 6.

Comment 4 Huzaifa S. Sidhpurwala 2011-10-06 08:31:42 UTC
This issue affects the version of radvd as shipped with Fedora 14 and 15.

Comment 5 Huzaifa S. Sidhpurwala 2011-10-07 05:28:51 UTC
Public via:
http://thread.gmane.org/gmane.comp.security.oss.general/5973

Comment 6 Huzaifa S. Sidhpurwala 2011-10-07 05:36:43 UTC
Created radvd tracking bugs for this issue

Affects: fedora-all [bug 744116]

Comment 7 Fedora Update System 2011-10-27 03:55:07 UTC
radvd-1.8.2-2.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2011-10-27 03:56:37 UTC
radvd-1.8.2-2.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2011-10-28 17:22:19 UTC
radvd-1.8.2-2.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2011-10-28 17:23:08 UTC
radvd-1.8.2-2.fc14 has been pushed to the Fedora 14 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 11 Fedora Update System 2011-11-05 01:31:02 UTC
radvd-1.8.2-2.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.