FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Insufficient packet length validation in libalias

Affected packages
12.1 <= FreeBSD-kernel < 12.1_5
11.4 <= FreeBSD-kernel < 11.4_1
11.3 <= FreeBSD-kernel < 11.3_9

Details

VuXML ID 30ce591c-947b-11ea-92ab-00163e433440
Discovery 2020-05-12
Entry 2020-05-12

Problem Description:

libalias(3) packet handlers do not properly validate the packet length before accessing the protocol headers. As a result, if a libalias(3) module does not properly validate the packet length before accessing the protocol header, it is possible for an out of bound read or write condition to occur.

Impact:

A malicious attacker could send specially constructed packets that exploit the lack of validation allowing the attacker to read or write memory either from the kernel (for the in-kernel NAT implementation) or from the process space for natd (for the userspace implementation).

References

CVE Name CVE-2020-7454
FreeBSD Advisory SA-20:12.libalias