First published: Thu Aug 24 2006(Updated: )
Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the overflow in (1) pppoe and (2) ippp. NOTE: this issue was originally incorrectly reported for the ppp driver.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.11 | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =5.4 | |
FreeBSD Kernel | =5.5 | |
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.1 | |
NetBSD current | =2.0 | |
NetBSD current | =3.0 | |
NetBSD current | =4.0 | |
OpenBSD | =3.8 | |
OpenBSD | =3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4304 is considered a high-severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2006-4304, you should update your FreeBSD, OpenBSD, or NetBSD systems to the latest available versions that contain the security patch.
CVE-2006-4304 affects FreeBSD versions 4.11 to 6.1, OpenBSD versions 3.8 and 3.9, and NetBSD versions 2.0 to 4.0 beta.
CVE-2006-4304 can be exploited by remote attackers to cause a denial of service, obtain sensitive information, and potentially execute arbitrary code.
The recommended mitigation for CVE-2006-4304 is to apply the relevant security patches and updates provided by your operating system vendor.