First published: Wed Apr 25 2007(Updated: )
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.9 | |
OpenBSD | =4.0 | |
IETF IPv6 | ||
NetBSD current | =3.1 | |
NetBSD current | =3.1-rc3 | |
FreeBSD Kernel | =6.2 | |
FreeBSD Kernel | =6.2-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2242 has a severity rating that indicates it can cause a denial of service through network amplification.
CVE-2007-2242 exploits the IPv6 protocol through crafted type 0 route headers that can amplify network traffic between routers.
CVE-2007-2242 affects implementations of the IPv6 protocol, specifically on systems not running updated versions of OpenBSD, NetBSD, or FreeBSD.
Mitigation for CVE-2007-2242 includes disabling IPv6 type 0 routing headers or updating to patched versions of affected systems.
Yes, patches for CVE-2007-2242 are available in updated versions of the affected operating systems.