First published: Mon May 09 2011(Updated: )
Multiple stack consumption vulnerabilities in the kernel in NetBSD 4.0, 5.0 before 5.0.3, and 5.1 before 5.1.1, when IPsec is enabled, allow remote attackers to cause a denial of service (memory corruption and panic) or possibly have unspecified other impact via a crafted (1) IPv4 or (2) IPv6 packet with nested IPComp headers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =5.1 | |
NetBSD NetBSD | =5.0 | |
NetBSD NetBSD | =4.0 | |
NetBSD NetBSD | =5.0.2 | |
NetBSD NetBSD | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1547 has a severity rating that indicates it can cause denial of service due to memory corruption and panic.
To resolve CVE-2011-1547, upgrade to NetBSD versions 5.0.3, 5.1.1, or later.
CVE-2011-1547 affects NetBSD versions 4.0, 5.0 (up to 5.0.2), and 5.1 (up to 5.1.0) when IPsec is enabled.
CVE-2011-1547 can be triggered by crafted IPv4 or IPv6 packets.
The potential impacts of CVE-2011-1547 include denial of service and possible unspecified other impacts due to stack consumption.