First published: Sun Sep 05 1999(Updated: )
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =3.0 | |
FreeBSD FreeBSD | =3.1 | |
FreeBSD FreeBSD | =3.2 | |
FreeBSD FreeBSD | =3.3 | |
FreeBSD FreeBSD | =3.4 | |
FreeBSD FreeBSD | =3.5 | |
FreeBSD FreeBSD | =4.0 | |
FreeBSD FreeBSD | =5.0-alpha | |
NetBSD NetBSD | =1.4 | |
NetBSD NetBSD | =1.4.1 | |
NetBSD NetBSD | =1.4.1 | |
NetBSD NetBSD | =1.4.1 | |
NetBSD NetBSD | =1.4.1 | |
NetBSD NetBSD | =1.4.2 | |
NetBSD NetBSD | =1.4.2 | |
NetBSD NetBSD | =1.4.2 | |
NetBSD NetBSD | =1.4.2 | |
Openbsd Openbsd | =2.5 | |
Openbsd Openbsd | =2.6 | |
Openbsd Openbsd | =2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.