[BACK]Return to select.txt CVS log [TXT][DIR] Up to [local] / www / advisories

File: [local] / www / advisories / select.txt (download)

Revision 1.1, Sun Aug 11 21:52:55 2002 UTC (21 years, 10 months ago) by miod
Branch: MAIN
CVS Tags: HEAD

Advisory du jour, per provos@ request.

OpenBSD Security Advisory (adv.select)
Original Release Date: 2002-08-11

1. Systems affected:

        All versions of OpenBSD.

2. Overview:

	Insufficient boundary checks in the select call allow an
	attacker to overwrite kernel memory and execute arbitrary code
	in kernel context.

	Traditionally, the size parameter for the select system call
	is a signed integer.  As a result, the kernel evaluates the
	upper boundary checks in a signed context, so that an attacker
	can circumvent when using certain negative values.

	When the kernel copies the data for the select system call
	from userland the size is used as an unsigned integer which
	causes kernel memory to be overwritten with arbitrary data.

2. Impact:

        Local users can obtain complete system privileges and
        circumvent the extra security measures provided by the
        securelevel system.

3. Solution:

        Apply one of the supplied kernel patches or update to
        3.0-stable or 3.1-stable from 2002-08-11 17:00 EDT or later.

4. Patch:

	ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/014_scarg.patch