First published: Fri Mar 25 2022(Updated: )
engine.c in slaacd in OpenBSD 6.9 and 7.0 before 2022-02-21 has a buffer overflow triggerable by an IPv6 router advertisement with more than seven nameservers. NOTE: privilege separation and pledge can prevent exploitation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =6.9 | |
OpenBSD | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27881 is a vulnerability in the slaacd service in OpenBSD 6.9 and 7.0 that can be triggered by an IPv6 router advertisement with more than seven nameservers, leading to a buffer overflow.
CVE-2022-27881 has a severity rating of 7.5 (high).
The exploitation of CVE-2022-27881 can be prevented by using privilege separation and pledge.
CVE-2022-27881 affects OpenBSD 6.9 and 7.0.
You can find more information about CVE-2022-27881 at the following references: [Link 1](https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html), [Link 2](https://ftp.openbsd.org/pub/OpenBSD/patches/6.9/common/030_slaacd.patch.sig), [Link 3](https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/014_slaacd.patch.sig).