Discovered by experts with Core Security, the vulnerability allows attackers to gain complete control of an OpenBSD machine by sending malformed IPv6 packets.
“In order to perform such an attack, the attacker must be either on the same network as the target system or on a network that can route packets to the target system,” said Ivan Arce, CTO of Core Security.
Arce said that Core Security worked with OpenBSD developers to close the security hole in the system before disclosing the flaw. Users are highly encouraged to download the patch and recompile the kernel to secure their systems from an attack.
He said that the vulnerability highlights the fact that no operating system is impervious to security bugs, even one as hardened as OpenBSD. He also explained that this flaw should act as a warning to those deploying the IPv6 protocol.
"It’s an IPv6 problem and we wanted to point that out because it is an example of how implementing a complex protocol, even in one of the most robust and secure operating systems such as OpenBSD, could be prone to errors and implementation bugs,” he said.
“Since IPv6 is starting to pick up in terms of adoption, we felt that it was important to talk about this.”
OpenBSD flaw exploits IPv6 weakness
By Ericka Chickowski on Mar 15, 2007 12:06AM
Researchers released an advisory today disclosing a remote kernel buffer overflow flaw in the OpenBSD operating system that they claim is the first exploitable IPv6 vulnerability to be publicly disclosed with a proof-of-concept exploit.
Got a news tip for our journalists? Share it with us anonymously here.