Vulnerability Description
The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ICMPv6 Multicast Listener Discovery (MLD) query with a certain Maximum Response Delay value.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Kame | Kame | All versions |
| Freebsd | Freebsd | All versions |
| Netbsd | Netbsd | 4.0 |
Related Weaknesses (CWE)
References
- http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.htmlExploit
- http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c
- http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.46&r2=1.47
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-011.txt.asc
- http://securitytracker.com/id?1020822
- http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c
- http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.34%3Br2=
- http://www.kb.cert.org/vuls/id/817940US Government Resource
- http://www.securityfocus.com/bid/31026
- http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.htmlExploit
- http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c
- http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/mld6.c.diff?r1=1.46&r2=1.47
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-011.txt.asc
- http://securitytracker.com/id?1020822
- http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet6/mld6.c
FAQ
What is CVE-2008-2464?
CVE-2008-2464 is a vulnerability with a CVSS score of 7.1 (HIGH). The mld_input function in sys/netinet6/mld6.c in the kernel in NetBSD 4.0, FreeBSD, and KAME, when INET6 is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and pani...
How severe is CVE-2008-2464?
CVE-2008-2464 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2464?
Check the references section above for vendor advisories and patch information. Affected products include: Kame Kame, Freebsd Freebsd, Netbsd Netbsd.