Source: libnids
Severity: important
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for libnids.

CVE-2010-1144[0]:
| A vulnerability has been reported in Libnids, which can be exploited by
| malicious people to cause a DoS (Denial of Service).
| 
| The vulnerability is caused due to a NULL pointer dereference error in
| src/ip_fragment.c, which can be exploited to crash an application using the
| library by sending specially crafted network traffic.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

I extracted the patch from the diff to the new version, attached.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1144
    http://security-tracker.debian.org/tracker/CVE-2010-1144

-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
--- libnids-1.23/src/ip_fragment.c	2008-02-21 11:30:47.000000000 +0100
+++ libnids-1.24/src/ip_fragment.c	2010-03-14 11:15:58.000000000 +0100
@@ -378,7 +379,7 @@
 ip_evictor(void)
 {
   // fprintf(stderr, "ip_evict:numpack=%i\n", numpack);
-  while (this_host->ip_frag_mem > IPFRAG_LOW_THRESH) {
+  while (this_host && this_host->ip_frag_mem > IPFRAG_LOW_THRESH) {
     if (!this_host->ipqueue)
       panic("ip_evictor: memcount");
     ip_free(this_host->ipqueue);

Attachment: pgpHMfjei7QjT.pgp
Description: PGP signature

Reply via email to