Vulnerability Description
The ip6_savecontrol function in NetBSD 2.0 through 3.0, under certain configurations, does not check to see if IPv4-mapped sockets are being used before processing IPv6 socket options, which allows local users to cause a denial of service (crash) by creating an IPv4-mapped IPv6 socket with the SO_TIMESTAMP socket option set, then sending an IPv4 packet through the socket.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 2.0 |
References
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-016.txt.asc
- http://securitytracker.com/id?1016250
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27139
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-016.txt.asc
- http://securitytracker.com/id?1016250
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27139
FAQ
What is CVE-2006-3202?
CVE-2006-3202 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The ip6_savecontrol function in NetBSD 2.0 through 3.0, under certain configurations, does not check to see if IPv4-mapped sockets are being used before processing IPv6 socket options, which allows lo...
How severe is CVE-2006-3202?
CVE-2006-3202 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3202?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd.