CVE-2008-3530 Details

CVE-2008-3530

Published: 2008-09-05
Last Modified: 2017-08-08
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote attackers to cause a denial of service (panic) via a crafted Packet Too Big Message.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.1/10
Exploit Score 8.6/10
Access Vector Network
Access Complexity Medium
Authentication None
Impact Score 6.9/10
Confidentiality Impact None
Availability Impact Complete
Integrity Impact None
Vector String AV:N/AC:M/Au:N/C:N/I:N/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:* Yes - -
References

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-015.txt.asc
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://secunia.com/advisories/31745
http://secunia.com/advisories/32401
http://secunia.com/advisories/35074
http://security.freebsd.org/advisories/FreeBSD-SA-08:09.icmp6.asc
http://support.apple.com/kb/HT3467
http://support.apple.com/kb/HT3549
http://www.securityfocus.com/bid/31004
http://www.securitytracker.com/id?1020820
http://www.securitytracker.com/id?1021111
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://www.vupen.com/english/advisories/2009/0633
http://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/44908

CVE ID
CVE-2008-3530
Published
2008-09-05
Modified
2017-08-08
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-20

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.