OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-002.txt.asc - | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016704.html - | |
References | () http://marc.info/?l=bugtraq&m=107604603226564&w=2 - | |
References | () http://www.guninski.com/obsdmtu.html - | |
References | () http://www.openbsd.org/cgi-bin/cvsweb/src/sys/netinet6/ip6_output.c - | |
References | () http://www.osvdb.org/3825 - | |
References | () http://www.securityfocus.com/bid/9577 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/15044 - |
Information
Published : 2004-11-23 05:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0257
Mitre link : CVE-2004-0257
CVE.ORG link : CVE-2004-0257
JSON object : View
Products Affected
netbsd
- netbsd
openbsd
- openbsd
CWE