First published: Fri Sep 05 2008(Updated: )
sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote attackers to cause a denial of service (panic) via a crafted Packet Too Big Message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =7.0 | |
FreeBSD Kernel | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3530 is classified as a high severity vulnerability due to its ability to cause a denial of service.
To fix CVE-2008-3530, upgrade to FreeBSD versions 7.2 or later, which include patches for this vulnerability.
CVE-2008-3530 affects FreeBSD versions 6.3 through 7.1 and potentially other operating systems.
Yes, CVE-2008-3530 can be exploited remotely by attackers sending a crafted ICMPv6 Packet Too Big message.
CVE-2008-3530 can lead to system panic, resulting in denial of service and potential downtime.