Lucene search

K
freebsdFreeBSD3DABF5B8-47C0-11EE-8E38-002590C1F29C
HistoryAug 01, 2023 - 12:00 a.m.

FreeBSD -- Remote denial of service in IPv6 fragment reassembly

2023-08-0100:00:00
vuxml.freebsd.org
6
freebsd
ipv6
kernel panic

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.1%

Problem Description:
Each fragment of an IPv6 packet contains a fragment header which
specifies the offset of the fragment relative to the original packet,
and each fragment specifies its length in the IPv6 header. When
reassembling the packet, the kernel calculates the complete IPv6 payload
length. The payload length must fit into a 16-bit field in the IPv6
header.
Due to a bug in the kernel, a set of carefully crafted packets can
trigger an integer overflow in the calculation of the reassembled
packet’s payload length field.
Impact:
Once an IPv6 packet has been reassembled, the kernel continues
processing its contents. It does so assuming that the fragmentation
layer has validated all fields of the constructed IPv6 header. This bug
violates such assumptions and can be exploited to trigger a remote
kernel panic, resulting in a denial of service.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchfreebsd-kernel= 13.2UNKNOWN
FreeBSDanynoarchfreebsd-kernel< 13.2_2UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

23.1%

Related for 3DABF5B8-47C0-11EE-8E38-002590C1F29C