Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2006-0381

CVE information

Published

16 years ago

Last Modified

5 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
  Yes
- -
cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
  Yes
- -