7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.154 Low
EPSS
Percentile
95.9%
IPv6 Type 0 Route Headers allow the sender to control packet routing. This vulnerability may allow an attacker to cause a denial-of-service condition.
Routing header options provided by IPv6 allow packet senders to indicate specific nodes through which the packet should travel. Note that a node is defined as any device that implements IPv6, which includes hosts as well as routing devices. According to FreeBSD-SA-07:03.ipv6:
An attacker can “amplify” a denial of service attack against a link between two vulnerable hosts; that is, by sending a small volume of traffic the attacker can consume a much larger amount of bandwidth between the two vulnerable hosts.
_
An attacker can use vulnerable hosts to “concentrate” a denial of service attack against a victim host or network; that is, a set of packets sent over a period of 30 seconds or more could be constructed such that they all arrive at the victim within a period of 1 second or less._
This condition can facilitate a number of different impacts including packet amplification, bypassing filtering devices, denial of service, and defeating IPv6 Anycast.
Update
See the systems affected portion of this document for information about updates for specific vendors.
267289
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: May 09, 2007 Updated: June 21, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to Apple Mac OS X 10.4.10 Update.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: May 15, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 14, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to FreeBSD-SA-07:03.ipv6.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: June 15, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to <http://software.fujitsu.com/jp/security/vulnerabilities/vu267289.html>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: May 14, 2007
Affected
AlaxalA AX series (except AX1200S/AX2400S series) and Hitachi GR4000/GR2000/GS4000/GS3000 are vulnerable to this issue. Note that AlaxalA AX series (except AX1200S/AX2400S series) and Hitachi GR4000/GR2000/GS4000/GS3000 have a threshold mechanism to ignore IPv6 Routing Header Type 0. This mechanism limits the impact of possible attacks.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 14, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to <http://www.seil.jp/en/news/snote/snote_200705_01_en.html>
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: June 15, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to <http://www.nec.co.jp/psirt/index.html> (Japanese only).
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Updated: May 14, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to <http://openbsd.org/errata40.html#012_route6>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Updated: May 17, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to RHSA-2007-0347.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: June 15, 2007
Affected
Sidewinder G2, Sidewinder 7, and TSP: Not Vulnerable
By default, Sidewinder ignores routing header 0, and strips it from datagrams
passing through the firewall.
TSP drops IPv6 datagrams containing routing headers.
SnapGear: Vulnerable
SnapGear products at version 3.1.5 and earlier honor IPv6 routing header 0.
This will be corrected in an upcoming release.
This vulnerability is not relevant to any other Secure Computing products.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 17, 2007
Statement Date: May 16, 2007
Affected
Sun can confirm that while Solaris has support for the IPv6 Routing Header type 0 that is described in VU#267289, packets containing this header extension are discarded by default on Solaris 9 and 10, and Solaris 8 can be configured to discard them by setting a kernel driver parameter.
For Solaris systems, this setting is controlled by the ip6_forward_src_routed kernel driver parameter, which defaults to 1 on Solaris 8 systems, and 0 on later systems. The ‘ndd(1M)’ command can be used to set this variable, for example to set it for the current session the command could be used as follows:
More details are available from the following blog post:
<http://blogs.sun.com/security/entry/ipv6_routing_header_issues>
We are not aware of further vendor information regarding this vulnerability.
Updated: June 21, 2007
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Refer to rPSA-2007-0124-1.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23267289 Feedback>).
Notified: May 09, 2007 Updated: July 22, 2011
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 17, 2007
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: May 09, 2007 Updated: May 09, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
View all 73 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by Philippe Biondi Arnaud Ebalard of EADS Innovation Works — IW/SE/CS, IT Sec lab, Suresnes, France at CanSecWest 2007.
This document was written by Chris Taschner.
CVE IDs: | CVE-2007-2242 |
---|---|
Severity Metric: | 11.03 Date Public: |
docs.info.apple.com/article.html?artnum=305712
openbsd.org/errata40.html#012_route6
secunia.com/advisories/24978/
secunia.com/advisories/25033/
secunia.com/advisories/25068/
secunia.com/advisories/25770/
secunia.com/advisories/26703/
www.ietf.org/rfc/rfc2460.txt
www.secdev.org/conf/IPv6_RH_security-csw07.pdf