Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2009-0687

Опубликовано: 11 авг. 2009
Источник: nvd
CVSS2: 7.8
EPSS Средний

Описание

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:midnightbsd:midnightbsd:0.3-current:*:*:*:*:*:*:*
cpe:2.3:o:mirbsd:miros:*:*:*:*:*:*:*:*
Версия до 10 (включая)
cpe:2.3:o:netbsd:netbsd:5.0:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:4.4:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:4.5:*:*:*:*:*:*:*

EPSS

Процентиль: 94%
0.13584
Средний

7.8 High

CVSS2

Дефекты

CWE-399

Связанные уязвимости

github
почти 4 года назад

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

EPSS

Процентиль: 94%
0.13584
Средний

7.8 High

CVSS2

Дефекты

CWE-399