mirror of https://github.com/dswd/vpncloud.git
Created Security Advisories (markdown)
parent
f632b72355
commit
ba8a72b100
|
@ -0,0 +1,16 @@
|
||||||
|
# Advisory 1: Buffer-overflow in some unreleased intermediate versions between 0.1 and 0.2
|
||||||
|
|
||||||
|
## Summary
|
||||||
|
Some unreleased intermediate versions of VpnCloud between 0.1 and 0.2 contain a critical flaw that allows arbitrary code execution.
|
||||||
|
|
||||||
|
## Details
|
||||||
|
When parsing the claimed address ranges contained in an `Init` message, the code first reads one byte that determines the size of the address and then it reads that many bytes into a buffer of 16 bytes without checking the length.
|
||||||
|
An attacker can exploit this to write up to 255 bytes in a 16 byte buffer and thereby overflowing the buffer by up to 239 bytes. The buffer is defined with fixed size and therefore allocated on the stack.
|
||||||
|
This flaw can be exploited using special-crafted UDP packets. If encryption is enabled, the attacker needs to be able to encrypt packets with the correct shared-key to exploit the flaw.
|
||||||
|
|
||||||
|
## Severity: Critical
|
||||||
|
Exploiting the flaw to execute arbitrary code should be simple. Since the flaw can be triggered by UDP packets and the process is running with root privileges, the severity is to be considered critical.
|
||||||
|
|
||||||
|
## Affected Versions
|
||||||
|
The bug was introduced on 2015-11-24 with commit [946e384](https://github.com/dswd/vpncloud.rs/commit/946e384660810c46d86ee859af5bbce11112ee5d) and fixed on 2015-11-26 with commit [f933c54](https://github.com/dswd/vpncloud.rs/commit/f933c541f88a4ae20008c1be37b55213ebe421b3) (without realizing the full severity). No released versions of VpnCloud were affected.
|
||||||
|
|
Loading…
Reference in New Issue