FreeBSD : FreeBSD -- ure device driver susceptible to packet-in-packet attack (bb53af7b-f7e4-11ea-88f8-901b0ef719ab)

High Nessus Plugin ID 140629

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A programming error in the ure(4) device driver caused some Realtek USB Ethernet interfaces to incorrectly report packets with more than 2048 bytes in a single USB transfer as having a length of only 2048 bytes.

An adversary can exploit this to cause the driver to misinterpret part of the payload of a large packet as a separate packet, and thereby inject packets across security boundaries such as VLANs. Impact : An attacker that can send large frames (larger than 2048 bytes in size) to be received by the host (be it VLAN, or non-VLAN tagged packet), can inject arbitrary packets to be received and processed by the host.
This includes spoofing packets from other hosts, or injecting packets to other VLANs than the host is on.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?ca63d035

Plugin Details

Severity: High

ID: 140629

File Name: freebsd_pkg_bb53af7bf7e411ea88f8901b0ef719ab.nasl

Version: 1.1

Type: local

Published: 2020/09/17

Updated: 2020/09/17

Dependencies: 12634

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:FreeBSD, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info, Settings/ParanoidReport

Patch Publication Date: 2020/09/16

Vulnerability Publication Date: 2020/09/15

Reference Information

CVE: CVE-2020-7464

FreeBSD: SA-20:27.ure