Vulnerability CVE-2009-0687


Published: 2009-08-11   Modified: 2012-02-13

Description:
The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

See advisories in our WLB2 database:
Topic
Author
Date
High
OpenBSD 4.3 up to 4.5: PF null pointer dereference - remote DoS
rembrandt
12.08.2009

Type:

CWE-399

(Resource Management Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Openbsd -> Openbsd 
Netbsd -> Netbsd 
Mirbsd -> Miros 
Midnightbsd -> Midnightbsd 

 References:
http://www.vupen.com/english/advisories/2009/1015
http://www.openbsd.org/errata45.html#002_pf
http://www.openbsd.org/errata44.html#013_pf
http://www.openbsd.org/errata43.html#013_pf
ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch
http://xforce.iss.net/xforce/xfdb/49837
http://www.securityfocus.com/archive/1/502634
http://www.osvdb.org/53608
http://www.milw0rm.com/exploits/8581
http://www.milw0rm.com/exploits/8406
http://www.helith.net/txt/multiple_vendor-PF_null_pointer_dereference.txt
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-001.txt.asc

Copyright 2022, cxsecurity.com

 

Back to Top