First published: Thu Dec 30 1999(Updated: )
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bsdi Bsd Os | =3.1 | |
FreeBSD FreeBSD | =1.0 | |
FreeBSD FreeBSD | =1.1 | |
FreeBSD FreeBSD | =1.1.5.1 | |
FreeBSD FreeBSD | =1.2 | |
FreeBSD FreeBSD | =2.0 | |
FreeBSD FreeBSD | =2.0.1 | |
FreeBSD FreeBSD | =2.0.5 | |
FreeBSD FreeBSD | =2.1.5 | |
FreeBSD FreeBSD | =2.1.6 | |
FreeBSD FreeBSD | =2.1.6.1 | |
FreeBSD FreeBSD | =2.1.7 | |
FreeBSD FreeBSD | =2.1.7.1 | |
FreeBSD FreeBSD | =2.2 | |
FreeBSD FreeBSD | =2.2.2 | |
FreeBSD FreeBSD | =2.2.3 | |
FreeBSD FreeBSD | =2.2.4 | |
FreeBSD FreeBSD | =2.2.5 | |
FreeBSD FreeBSD | =2.2.6 | |
FreeBSD FreeBSD | =2.2.8 | |
FreeBSD FreeBSD | =3.0 | |
Openbsd Openbsd | =2.3 | |
Openbsd Openbsd | =2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.