CVE-2009-0687
Published Aug 11, 2009
Last updated 7 years ago
Overview
- Description
- The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.
- Source
- cret@cert.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:midnightbsd:midnightbsd:0.3-current:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BB266CE-0E06-4094-AE00-0ADBD2364F22" }, { "criteria": "cpe:2.3:o:mirbsd:miros:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6A4B5B9-C443-4A85-852D-F3B71732BCDA", "versionEndIncluding": "10" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00564BAA-066A-4627-B6A8-78724E55D363" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DF8DD37-A337-4E9D-A34E-C2D561A24285" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F12313A0-1EAF-4652-9AB1-799171CFFEA9" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89CA041B-4153-43C7-BA69-D6052F4EBEEB" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B32BB973-60E5-402B-83FE-547786BC7A57" } ], "operator": "OR" } ] } ]