Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0177

Опубликовано: 07 фев. 2008
Источник: debian
EPSS Средний

Описание

The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-7not-affectedpackage
kfreebsd-6not-affectedpackage
kfreebsd-5removedpackage
kfreebsd-5no-dsaetchpackage

Примечания

  • Linux kernel code is not affected, the proper check is there

  • (somewhat difficult to spot, it happens in the caller).

EPSS

Процентиль: 96%
0.28131
Средний

Связанные уязвимости

ubuntu
почти 18 лет назад

The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.

nvd
почти 18 лет назад

The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.

github
больше 3 лет назад

The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.

EPSS

Процентиль: 96%
0.28131
Средний