First published: Thu Mar 13 2008(Updated: )
The ipsec4_get_ulp function in the kernel in NetBSD 2.0 through 3.1 and NetBSD-current before 20071028, when the fast_ipsec subsystem is enabled, allows remote attackers to bypass the IPsec policy by sending packets from a source machine with a different endianness than the destination machine, a different vulnerability than CVE-2006-0905.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =2.0.4 | |
NetBSD NetBSD | =2.1 | |
NetBSD NetBSD | =3.1-rc3 | |
NetBSD NetBSD | =2.0.2 | |
NetBSD NetBSD | =3.0.1 | |
Netbsd Netbsd Current | <=20071027 | |
NetBSD NetBSD | =2.0.3 | |
NetBSD NetBSD | =3.0.2 | |
NetBSD NetBSD | =2.1.1 | |
NetBSD NetBSD | =2.0.1 | |
NetBSD NetBSD | =3.1 | |
NetBSD NetBSD | =3.0 | |
NetBSD NetBSD | =2.0 | |
NetBSD NetBSD | =3.1-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1335 is classified as a medium severity vulnerability.
To mitigate CVE-2008-1335, update NetBSD to a version released after 20071028 where the vulnerability is addressed.
CVE-2008-1335 affects NetBSD versions 2.0 through 3.1, including certain release candidates.
Yes, CVE-2008-1335 can be exploited remotely due to its nature of allowing attackers to bypass IPsec policy.
CVE-2008-1335 involves the ipsec4_get_ulp function which allows packet manipulation based on differing endianness.