A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc | Mitigation Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230804-0001/ | Third Party Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc | Mitigation Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230804-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc - Mitigation, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230804-0001/ - Third Party Advisory |
07 Aug 2023, 15:24
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-190 | |
First Time |
Freebsd freebsd
Netapp Netapp clustered Data Ontap Freebsd |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://security.netapp.com/advisory/ntap-20230804-0001/ - Third Party Advisory | |
References | (MISC) https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc - Mitigation, Vendor Advisory | |
CPE | cpe:2.3:o:freebsd:freebsd:13.1:p8:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:rc2-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:rc1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p6:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:p3:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p5:*:*:*:*:*:* cpe:2.3:a:netapp:clustered_data_ontap:9.0:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b2-p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p4:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:rc2-p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p7:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:b1-p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:p2:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:p1:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.2:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:12.4:-:*:*:*:*:*:* cpe:2.3:o:freebsd:freebsd:13.1:p2:*:*:*:*:*:* |
04 Aug 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Aug 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-01 23:15
Updated : 2024-11-21 08:16
NVD link : CVE-2023-3107
Mitre link : CVE-2023-3107
CVE.ORG link : CVE-2023-3107
JSON object : View
Products Affected
freebsd
- freebsd
netapp
- clustered_data_ontap
CWE
CWE-190
Integer Overflow or Wraparound