CVE-2008-1335
Published Mar 13, 2008
Last updated 16 years ago
Overview
- Description
- The ipsec4_get_ulp function in the kernel in NetBSD 2.0 through 3.1 and NetBSD-current before 20071028, when the fast_ipsec subsystem is enabled, allows remote attackers to bypass the IPsec policy by sending packets from a source machine with a different endianness than the destination machine, a different vulnerability than CVE-2006-0905.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3C3F588-98DA-4F6F-A083-2B9EE534C561" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C2ED81B-8DA2-46D0-AE24-C61BF8E78AE9" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D18C95A3-15E3-41B8-AC28-ACEA57021E24" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CFC6B75-9057-4E58-A4D4-8AEC12AE62E4" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36419DD6-0DB4-4BB6-A35F-D8FDB89402F1" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28BD9F91-2384-4557-9648-25FC00D04677" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ECF9E5F-AF38-42B9-8B49-6C254394CDFB" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9CABFAA-594C-45D7-A0C7-795872A0C68A" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F9432E9-AACA-4242-BDAB-8792ACF72C12" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29C02C6B-AAFD-4594-94A4-F26BA3648CB0" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C533D7-771E-4E33-A4FE-764C0B73F920" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E59D3682-22E1-40C4-AC65-079005FB6194" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:3.1:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D95D05C-4FE1-4408-B8B8-5C5932800385" }, { "criteria": "cpe:2.3:o:netbsd:netbsd_current:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94777BA7-6528-4BE4-AE50-EA3C4A19C4E7", "versionEndIncluding": "20071027" } ], "operator": "OR" } ] } ]