Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-BB53AF7B-F7E4-11EA-88F8-901B0EF719AB (CVE-2020-7464): FreeBSD -- ure device driver susceptible to packet-in-packet attack

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-BB53AF7B-F7E4-11EA-88F8-901B0EF719AB (CVE-2020-7464): FreeBSD -- ure device driver susceptible to packet-in-packet attack

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
09/15/2020
Created
09/19/2020
Added
09/17/2020
Modified
04/05/2021

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.

From VID-BB53AF7B-F7E4-11EA-88F8-901B0EF719AB:

Problem Description:

A programming error in the ure(4) device driver caused some Realtek USB

Ethernet interfaces to incorrectly report packets with more than 2048 bytes

in a single USB transfer as having a length of only 2048 bytes.

An adversary can exploit this to cause the driver to misinterpret part of the

payload of a large packet as a separate packet, and thereby inject packets

across security boundaries such as VLANs.

Impact:

An attacker that can send large frames (larger than 2048 bytes in size) to be

received by the host (be it VLAN, or non-VLAN tagged packet), can inject

arbitrary packets to be received and processed by the host. This includes

spoofing packets from other hosts, or injecting packets to other VLANs than

the host is on.

Solution(s)

  • freebsd-upgrade-base-11_3-release-p14
  • freebsd-upgrade-base-11_4-release-p4
  • freebsd-upgrade-base-12_1-release-p10

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;