A vulnerability in the OpenBSD kernel could allow a remote attacker to execute arbitrary code on a vulnerable system or cause the system to crash.
The OpenBSD kernel contains a flaw in its handling of kernel memory buffers when processing IPv6 packets. This flaw results in a memory corruption vulnerability that allows a remote attacker with the ability to send fragmented ICMPv6 packets to trigger an overflow of
mbuf kernel memory structures. The original reporters of this vulnerability, Core Security Technologies, have published a detailed analysis of this vulnerability in CoreLabs Advisory CORE-2007-0219.
Systems connected to public IPv6 networks are particularly at risk from this vulnerability. However, since link-local addresses are part of the IPv6 specification and configured by default on Ethernet interfaces, even systems that have not been explicitly configured to use public IPv6 networks are vulnerable to attack from other systems on the same physical network or multicast network.
Note that we are aware of working, publicly available exploit code for this vulnerability.
A remote, unauthenticated attacker with the ability to supply a specially crafted fragmented IPv6 packet may be able to execute arbitrary code on a vulnerable system or cause the system to crash. The attacker-supplied code would be executed in the context of the kernel.
Apply a patch from the vendor
The OpenBSD development team has published patches to address this issue. Please see the System Affected section of this document for more information.
Note that a second revision of the patch was released after the initial publication of this document. Users should be sure to obtain this second revision of the patch.
Filter IPv6 packets
Sites, particularly those who are unable to apply the patch, are encouraged to filter IPv6 traffic to affected hosts. For the OpenBSD packet filter, pf(4), use "
block in inet6" in
Vendor| Status| Date Notified| Date Updated
OpenBSD| | -| 21 Mar 2007
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This vulnerability was discovered and researched by Alfredo Ortega from Core Security Technologies.
This document was written by Chad R Dougherty.