First published: Sun Sep 05 1999(Updated: )
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =3.1 | |
FreeBSD Kernel | =3.2 | |
FreeBSD Kernel | =3.3 | |
FreeBSD Kernel | =3.4 | |
FreeBSD Kernel | =3.5 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =5.0-alpha | |
NetBSD current | =1.4 | |
NetBSD current | =1.4.1 | |
NetBSD current | =1.4.1 | |
NetBSD current | =1.4.1 | |
NetBSD current | =1.4.1 | |
NetBSD current | =1.4.2 | |
NetBSD current | =1.4.2 | |
NetBSD current | =1.4.2 | |
NetBSD current | =1.4.2 | |
OpenBSD | =2.5 | |
OpenBSD | =2.6 | |
OpenBSD | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0489 has been classified as a denial of service vulnerability affecting multiple BSD operating systems.
To fix CVE-2000-0489, you should update your FreeBSD, NetBSD, or OpenBSD systems to a version that addresses this vulnerability.
CVE-2000-0489 affects FreeBSD, NetBSD, and OpenBSD, specifically older versions like FreeBSD 3.x and various NetBSD releases.
Exploiting CVE-2000-0489 can lead to a denial of service condition, disrupting the availability of the affected system.
While CVE-2000-0489 targets older operating systems, it remains a concern for systems that have not been updated or are still in use.