7.8
CVSSv2

CVE-2007-2242

Published: 25/04/2007 Updated: 16/10/2018
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The IPv6 protocol allows remote malicious users to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.

Vulnerable Product Search on Vulmon Subscribe to Product

ietf ipv6

Vendor Advisories

A buffer overflow was discovered in the Moxa serial driver Local attackers could execute arbitrary code and gain root privileges (CVE-2005-0504) ...
The compat_sys_mount function allowed local users to cause a denial of service when mounting a smbfs filesystem in compatibility mode (CVE-2006-7203) ...

References

NVD-CWE-Otherhttp://www.secdev.org/conf/IPv6_RH_security-csw07.pdfhttp://openbsd.org/errata39.html#022_route6http://openbsd.org/errata40.html#012_route6http://www.securityfocus.com/bid/23615http://secunia.com/advisories/24978http://security.freebsd.org/advisories/FreeBSD-SA-07:03.ipv6.aschttp://secunia.com/advisories/25033http://secunia.com/advisories/25068https://issues.rpath.com/browse/RPL-1310http://secunia.com/advisories/25083http://www.redhat.com/support/errata/RHSA-2007-0347.htmlhttp://secunia.com/advisories/25288http://www.securityfocus.com/archive/1/471457http://docs.info.apple.com/article.html?artnum=306375http://docs.info.apple.com/article.html?artnum=305712http://www.mandriva.com/security/advisories?name=MDKSA-2007:171http://www.mandriva.com/security/advisories?name=MDKSA-2007:196http://www.mandriva.com/security/advisories?name=MDKSA-2007:216http://www.novell.com/linux/security/advisories/2007_51_kernel.htmlhttp://www.ubuntu.com/usn/usn-486-1http://www.ubuntu.com/usn/usn-508-1http://www.kb.cert.org/vuls/id/267289http://www.securitytracker.com/id?1017949http://secunia.com/advisories/25691http://secunia.com/advisories/25770http://secunia.com/advisories/26133http://secunia.com/advisories/26651http://secunia.com/advisories/26703http://secunia.com/advisories/26620http://secunia.com/advisories/26664http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.htmlhttp://secunia.com/advisories/28806http://www.vupen.com/english/advisories/2007/2270http://www.vupen.com/english/advisories/2007/3050http://www.vupen.com/english/advisories/2007/1563https://exchange.xforce.ibmcloud.com/vulnerabilities/33851https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9574http://www.securityfocus.com/archive/1/467939/30/6690/threadedhttps://usn.ubuntu.com/508-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/267289