engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/014_slaacd.patch.sig | patch vendor advisory release notes |
https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html | patch third party advisory exploit |
https://ftp.openbsd.org/pub/OpenBSD/patches/6.9/common/030_slaacd.patch.sig | patch vendor advisory release notes |
https://security.netapp.com/advisory/ntap-20220506-0005/ | third party advisory |