First published: Thu Feb 07 2008(Updated: )
The ipcomp6_input function in sys/netinet6/ipcomp_input.c in the KAME project before 20071201 does not properly check the return value of the m_pulldown function, which allows remote attackers to cause a denial of service (system crash) via an IPv6 packet with an IPComp header.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Kame Ipcomp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0177 has a severity rating that indicates it can lead to a denial of service due to a system crash.
To fix CVE-2008-0177, update to a version of the KAME project that is dated 20071201 or later.
CVE-2008-0177 enables remote attackers to trigger a denial of service attack through crafted IPv6 packets.
CVE-2008-0177 affects the Kame Ipcomp implementation prior to the update released on 20071201.
Exploitation of CVE-2008-0177 can lead to a system crash, impacting availability of the affected service.