FreeBSD : FreeBSD -- ICMPv6 use-after-free in error message handling (8eed0c5c-3482-11eb-b87a-901b0ef719ab)

high Nessus Plugin ID 143466

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

When an ICMPv6 error message is received, the FreeBSD ICMPv6 stack may extract information from the message to hand to upper-layer protocols.
As a part of this operation, it may parse IPv6 header options from a packet embedded in the ICMPv6 message.

The handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free. Impact : A remote host may be able to trigger a read of freed kernel memory. This may trigger a kernel panic if the address had been unmapped.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?505e5753

Plugin Details

Severity: High

ID: 143466

File Name: freebsd_pkg_8eed0c5c348211ebb87a901b0ef719ab.nasl

Version: 1.3

Type: local

Published: 12/3/2020

Updated: 6/16/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2020-7469

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:freebsd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Settings/ParanoidReport, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 12/2/2020

Vulnerability Publication Date: 12/1/2020

Reference Information

CVE: CVE-2020-7469

FreeBSD: SA-20:31.icmp6