Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   OS (UNIX)  >   OpenBSD Kernel Vendors:   OpenBSD
OpenBSD Kernel mbuf Handling Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017735
SecurityTracker URL:
CVE Reference:   CVE-2007-1365   (Links to External Site)
Updated:  Mar 21 2007
Original Entry Date:  Mar 7 2007
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.9, 4.0
Description:   A vulnerability was reported in OpenBSD. A remote user can execute arbitrary code on the target system.

The kernel mbuf handling of ICMPv6 packets contains a buffer overflow. A remote user can send a specially crafted IPv6 fragment to execute arbitrary code on the target system with kernel level privileges.

Default configurations are affected.

The vendor was notified on February 20, 2007.

Alfredo Ortega from Core Security Technologies discovered this vulnerability.

The original advisory is available at:

Impact:   A remote user can execute arbitrary code with kernel level privileges.

[Editor's note: The vendor originally reported this vulnerability as having a denial of service impact and the fix as being a reliability fix. Later, the vendor retracted the statement.]

Solution:   The vendor has issued the following patches.

The patches were revised on March 17, 2007. However, the patch URLs were not changed.

Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC