First published: Wed Sep 01 2004(Updated: )
OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote attackers to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =1.6 | |
NetBSD current | =1.6.1 | |
OpenBSD | =3.0 | |
OpenBSD | =3.1 | |
OpenBSD | =3.2 | |
OpenBSD | =3.3 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0257 has a severity rating that indicates it can cause a denial of service affecting OpenBSD 3.4 and NetBSD 1.6 and 1.6.1.
To fix CVE-2004-0257, upgrade to a patched version of OpenBSD or NetBSD that addresses this vulnerability.
CVE-2004-0257 affects OpenBSD versions 3.0 to 3.4 and NetBSD versions 1.6 and 1.6.1.
CVE-2004-0257 describes a remote denial of service attack that causes the system to crash when processing specific IPv6 packets.
If your system is vulnerable to CVE-2004-0257, apply patches or updates immediately to mitigate the denial of service risk.