FreeBSD NFS Server READDIR Request Memory Corruption (CVE-2013-3266)
|Check Point Reference:||CPAI-2013-2495|
|Source:||FreeBSD Advisory FreeBSD-SA-13:05.nfsserver.asc|
|Protection Provided by:||
Who is Vulnerable?
FreeBSD Project FreeBSD 8.x
FreeBSD Project FreeBSD 9.x
A memory corruption vulnerability has been reported in nfsrvd_readdir() function in FreeBSD NFS server.
The vulnerability is due to insufficient sanitation of READDIR requests and can result in the underlying filesystem to interpret a file as a directory. A remote attacker can exploit this vulnerability using a specially crafted READDIR request. A successful exploitation can result in arbitrary code execution in the security context of the kernel. If the attack is unsuccessful, a denial of service condition may result.
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
- In the IPS tab, click Protections and find the FreeBSD NFS Server READDIR Request Memory Corruption protection using the Search tool and Edit the protection's settings.
- Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: NFS Protection Violation
Attack Information: FreeBSD NFS Server READDIR Request Memory Corruption