Vulnerability Description
The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in FreeBSD, NetBSD, and possibly other BSD-based operating systems allows remote attackers to cause a denial of service (CPU consumption and device hang) by sending many Router Advertisement (RA) messages with different source addresses, a similar vulnerability to CVE-2010-4670.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | All versions |
| Netbsd | Netbsd | All versions |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2011/Apr/86
- http://www.mh-sec.de/downloads/mh-RA_flooding_CVE-2010-multiple.txt
- http://seclists.org/fulldisclosure/2011/Apr/86
- http://www.mh-sec.de/downloads/mh-RA_flooding_CVE-2010-multiple.txt
FAQ
What is CVE-2011-2393?
CVE-2011-2393 is a vulnerability with a CVSS score of 7.8 (HIGH). The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in FreeBSD, NetBSD, and possibly other BSD-based operating systems allows remote attackers to cause a denial of service (CPU consu...
How severe is CVE-2011-2393?
CVE-2011-2393 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2393?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Netbsd Netbsd.