Vulnerability Description
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openbsd | Openbsd | 3.9 |
| Ietf | Ipv6 | All versions |
| Netbsd | Netbsd | 3.1 |
| Freebsd | Freebsd | 6.2 |
References
- http://docs.info.apple.com/article.html?artnum=305712
- http://docs.info.apple.com/article.html?artnum=306375
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
- http://openbsd.org/errata39.html#022_route6
- http://openbsd.org/errata40.html#012_route6
- http://secunia.com/advisories/24978PatchVendor Advisory
- http://secunia.com/advisories/25033
- http://secunia.com/advisories/25068
- http://secunia.com/advisories/25083
- http://secunia.com/advisories/25288
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/25770
- http://secunia.com/advisories/26133
- http://secunia.com/advisories/26620
- http://secunia.com/advisories/26651
FAQ
What is CVE-2007-2242?
CVE-2007-2242 is a vulnerability with a CVSS score of 7.8 (HIGH). The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
How severe is CVE-2007-2242?
CVE-2007-2242 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2242?
Check the references section above for vendor advisories and patch information. Affected products include: Openbsd Openbsd, Ietf Ipv6, Netbsd Netbsd, Freebsd Freebsd.