mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-01-04 16:10:10 +00:00
quagga: Security Advisory - CVE-2012-1820
The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-1820 Signed-off-by: Yue Tao <Yue.Tao@windriver.com> Signed-off-by: Jackie Huang <jackie.huang@windriver.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
This commit is contained in:
parent
d42a2e1605
commit
26b31ad728
|
|
@ -0,0 +1,87 @@
|
|||
From fe9bb6459afe0d55e56619cdc5061d8407cd1f15 Mon Sep 17 00:00:00 2001
|
||||
From: Denis Ovsienko <infrastation@yandex.ru>
|
||||
Date: Thu, 19 Apr 2012 20:34:13 +0400
|
||||
Subject: [PATCH] bgpd: CVE-2012-1820, DoS in bgp_capability_orf()
|
||||
|
||||
Upstream-Status: Backport
|
||||
|
||||
An ORF (code 3) capability TLV is defined to contain exactly one
|
||||
AFI/SAFI block. Function bgp_capability_orf(), which parses ORF
|
||||
capability TLV, uses do-while cycle to call its helper function
|
||||
bgp_capability_orf_entry(), which actually processes the AFI/SAFI data
|
||||
block. The call is made at least once and repeated as long as the input
|
||||
buffer has enough data for the next call.
|
||||
|
||||
The helper function, bgp_capability_orf_entry(), uses "Number of ORFs"
|
||||
field of the provided AFI/SAFI block to verify, if it fits the input
|
||||
buffer. However, the check is made based on the total length of the ORF
|
||||
TLV regardless of the data already consumed by the previous helper
|
||||
function call(s). This way, the check condition is only valid for the
|
||||
first AFI/SAFI block inside an ORF capability TLV.
|
||||
|
||||
For the subsequent calls of the helper function, if any are made, the
|
||||
check condition may erroneously tell, that the current "Number of ORFs"
|
||||
field fits the buffer boundary, where in fact it does not. This makes it
|
||||
possible to trigger an assertion by feeding an OPEN message with a
|
||||
specially-crafted malformed ORF capability TLV.
|
||||
|
||||
This commit fixes the vulnerability by making the implementation follow
|
||||
the spec.
|
||||
---
|
||||
bgpd/bgp_open.c | 26 ++------------------------
|
||||
1 files changed, 2 insertions(+), 24 deletions(-)
|
||||
|
||||
diff --git a/bgpd/bgp_open.c b/bgpd/bgp_open.c
|
||||
index d045dde..af711cc 100644
|
||||
--- a/bgpd/bgp_open.c
|
||||
+++ b/bgpd/bgp_open.c
|
||||
@@ -230,7 +230,7 @@ bgp_capability_orf_entry (struct peer *peer, struct capability_header *hdr)
|
||||
}
|
||||
|
||||
/* validate number field */
|
||||
- if (sizeof (struct capability_orf_entry) + (entry.num * 2) > hdr->length)
|
||||
+ if (sizeof (struct capability_orf_entry) + (entry.num * 2) != hdr->length)
|
||||
{
|
||||
zlog_info ("%s ORF Capability entry length error,"
|
||||
" Cap length %u, num %u",
|
||||
@@ -334,28 +334,6 @@ bgp_capability_orf_entry (struct peer *peer, struct capability_header *hdr)
|
||||
}
|
||||
|
||||
static int
|
||||
-bgp_capability_orf (struct peer *peer, struct capability_header *hdr)
|
||||
-{
|
||||
- struct stream *s = BGP_INPUT (peer);
|
||||
- size_t end = stream_get_getp (s) + hdr->length;
|
||||
-
|
||||
- assert (stream_get_getp(s) + sizeof(struct capability_orf_entry) <= end);
|
||||
-
|
||||
- /* We must have at least one ORF entry, as the caller has already done
|
||||
- * minimum length validation for the capability code - for ORF there must
|
||||
- * at least one ORF entry (header and unknown number of pairs of bytes).
|
||||
- */
|
||||
- do
|
||||
- {
|
||||
- if (bgp_capability_orf_entry (peer, hdr) == -1)
|
||||
- return -1;
|
||||
- }
|
||||
- while (stream_get_getp(s) + sizeof(struct capability_orf_entry) < end);
|
||||
-
|
||||
- return 0;
|
||||
-}
|
||||
-
|
||||
-static int
|
||||
bgp_capability_restart (struct peer *peer, struct capability_header *caphdr)
|
||||
{
|
||||
struct stream *s = BGP_INPUT (peer);
|
||||
@@ -573,7 +551,7 @@ bgp_capability_parse (struct peer *peer, size_t length, int *mp_capability,
|
||||
break;
|
||||
case CAPABILITY_CODE_ORF:
|
||||
case CAPABILITY_CODE_ORF_OLD:
|
||||
- if (bgp_capability_orf (peer, &caphdr))
|
||||
+ if (bgp_capability_orf_entry (peer, &caphdr))
|
||||
return -1;
|
||||
break;
|
||||
case CAPABILITY_CODE_RESTART:
|
||||
--
|
||||
1.7.5.4
|
||||
|
||||
|
|
@ -0,0 +1,42 @@
|
|||
From 5e728e929942d39ce5a4ab3d01c33f7b688c4e3f Mon Sep 17 00:00:00 2001
|
||||
From: David Lamparter <equinox@opensourcerouting.org>
|
||||
Date: Wed, 23 Jan 2013 05:50:24 +0100
|
||||
Subject: [PATCH] bgpd: relax ORF capability length handling
|
||||
|
||||
Upstream-Status: Backport
|
||||
|
||||
commit fe9bb64... "bgpd: CVE-2012-1820, DoS in bgp_capability_orf()"
|
||||
made the length test in bgp_capability_orf_entry() stricter and is now
|
||||
causing us to refuse (with CEASE) ORF capabilites carrying any excess
|
||||
data. This does not conform to the robustness principle as laid out by
|
||||
RFC1122 ("be liberal in what you accept").
|
||||
|
||||
Even worse, RFC5291 is quite unclear on how to use the ORF capability
|
||||
with multiple AFI/SAFIs. It can be interpreted as either "use one
|
||||
instance, stuff everything in" but also as "use multiple instances".
|
||||
So, if not for applying robustness, we end up clearing sessions from
|
||||
implementations going by the former interpretation. (or if anyone dares
|
||||
add a byte of padding...)
|
||||
|
||||
Cc: Denis Ovsienko <infrastation@yandex.ru>
|
||||
Signed-off-by: David Lamparter <equinox@opensourcerouting.org>
|
||||
---
|
||||
bgpd/bgp_open.c | 2 +-
|
||||
1 files changed, 1 insertions(+), 1 deletions(-)
|
||||
|
||||
diff --git a/bgpd/bgp_open.c b/bgpd/bgp_open.c
|
||||
index af711cc..7bf3501 100644
|
||||
--- a/bgpd/bgp_open.c
|
||||
+++ b/bgpd/bgp_open.c
|
||||
@@ -230,7 +230,7 @@ bgp_capability_orf_entry (struct peer *peer, struct capability_header *hdr)
|
||||
}
|
||||
|
||||
/* validate number field */
|
||||
- if (sizeof (struct capability_orf_entry) + (entry.num * 2) != hdr->length)
|
||||
+ if (sizeof (struct capability_orf_entry) + (entry.num * 2) > hdr->length)
|
||||
{
|
||||
zlog_info ("%s ORF Capability entry length error,"
|
||||
" Cap length %u, num %u",
|
||||
--
|
||||
1.7.5.4
|
||||
|
||||
|
|
@ -36,6 +36,8 @@ SRC_URI = "${SAVANNAH_GNU_MIRROR}/quagga${QUAGGASUBDIR}/quagga-${PV}.tar.gz;name
|
|||
file://quagga.pam \
|
||||
file://ripd-fix-two-bugs-after-received-SIGHUP.patch \
|
||||
file://quagga-Avoid-duplicate-connected-address.patch \
|
||||
file://0001-bgpd-CVE-2012-1820-DoS-in-bgp_capability_orf.patch \
|
||||
file://0001-bgpd-relax-ORF-capability-length-handling.patch \
|
||||
"
|
||||
|
||||
PACKAGECONFIG ??= "${@base_contains('DISTRO_FEATURES', 'pam', 'pam', '', d)}"
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user