Lucene search

K

FreeBSD Security Advisory (FreeBSD-SA-08:09.icmp6.asc)

πŸ—“οΈΒ 04 Sep 2008Β 00:00:00Reported byΒ Copyright (C) 2008 E-Soft Inc.TypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 17Β Views

The FreeBSD-SA-08:09.icmp6.asc advisory addresses inadequate check on proposed MTU for a path to the destination during processing IPv6 packets

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Prion
Input validation
5 Sep 200816:08
–prion
seebug.org
FreeBSDη•Έε½’ICMPv6ζŠ₯ζ–‡θΏœη¨‹ζ‹’η»ζœεŠ‘ζΌζ΄ž
10 Sep 200800:00
–seebug
FreeBSD Advisory
FreeBSD-SA-08:09.icmp6
3 Sep 200800:00
–freebsd_advisory
CVE
CVE-2008-3530
5 Sep 200816:08
–cve
Cvelist
CVE-2008-3530
5 Sep 200816:00
–cvelist
FreeBSD
FreeBSD -- Remote kernel panics on IPv6 connections
3 Sep 200800:00
–freebsd
OpenVAS
FreeBSD Security Advisory (FreeBSD-SA-08:09.icmp6.asc)
4 Sep 200800:00
–openvas
OpenVAS
Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
12 May 201000:00
–openvas
OpenVAS
Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002
12 May 201000:00
–openvas
NVD
CVE-2008-3530
5 Sep 200816:08
–nvd
Rows per page
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.61515");
  script_version("2023-07-26T05:05:09+0000");
  script_tag(name:"last_modification", value:"2023-07-26 05:05:09 +0000 (Wed, 26 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)");
  script_cve_id("CVE-2008-3530");
  script_tag(name:"cvss_base", value:"7.1");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:N/A:C");
  script_name("FreeBSD Security Advisory (FreeBSD-SA-08:09.icmp6.asc)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("FreeBSD Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/freebsd", "ssh/login/freebsdpatchlevel");

  script_tag(name:"insight", value:"IPv6 nodes use ICMPv6 amongst other things to report errors encountered
while processing packets.  The 'Packet Too Big Message' is sent in
case a node cannot forward a packet because the size of the packet is
larger than the MTU of next-hop link.

In case of an incoming ICMPv6 'Packet Too Big Message', there is an
insufficient check on the proposed new MTU for a path to the destination.");

  script_tag(name:"solution", value:"Upgrade your system to the appropriate stable release
  or security branch dated after the correction date.");

  script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=FreeBSD-SA-08:09.icmp6.asc");

  script_tag(name:"summary", value:"The remote host is missing an update to the system
  as announced in the referenced advisory FreeBSD-SA-08:09.icmp6.asc");

  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-bsd.inc");

vuln = FALSE;

if(patchlevelcmp(rel:"7.0", patchlevel:"4")<0) {
  vuln = TRUE;
}
if(patchlevelcmp(rel:"6.3", patchlevel:"4")<0) {
  vuln = TRUE;
}

if(vuln) {
  security_message(port:0);
} else if (__pkg_match) {
  exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
04 Sep 2008 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS27.1
EPSS0.03513
17
.json
Report