Created Security Advisories (markdown)

dswd 2016-07-01 11:17:59 +02:00
parent f632b72355
commit ba8a72b100
1 changed files with 16 additions and 0 deletions

16
Security-Advisories.md Normal file

@ -0,0 +1,16 @@
# Advisory 1: Buffer-overflow in some unreleased intermediate versions between 0.1 and 0.2
## Summary
Some unreleased intermediate versions of VpnCloud between 0.1 and 0.2 contain a critical flaw that allows arbitrary code execution.
## Details
When parsing the claimed address ranges contained in an `Init` message, the code first reads one byte that determines the size of the address and then it reads that many bytes into a buffer of 16 bytes without checking the length.
An attacker can exploit this to write up to 255 bytes in a 16 byte buffer and thereby overflowing the buffer by up to 239 bytes. The buffer is defined with fixed size and therefore allocated on the stack.
This flaw can be exploited using special-crafted UDP packets. If encryption is enabled, the attacker needs to be able to encrypt packets with the correct shared-key to exploit the flaw.
## Severity: Critical
Exploiting the flaw to execute arbitrary code should be simple. Since the flaw can be triggered by UDP packets and the process is running with root privileges, the severity is to be considered critical.
## Affected Versions
The bug was introduced on 2015-11-24 with commit [946e384](https://github.com/dswd/vpncloud.rs/commit/946e384660810c46d86ee859af5bbce11112ee5d) and fixed on 2015-11-26 with commit [f933c54](https://github.com/dswd/vpncloud.rs/commit/f933c541f88a4ae20008c1be37b55213ebe421b3) (without realizing the full severity). No released versions of VpnCloud were affected.