Vulnerabilities > CVE-2004-0370 - Unspecified vulnerability in Freebsd 5.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN freebsd
nessus
Summary
The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow attackers to read kernel memory and cause a system panic.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_SETSOCKOPT_521_4.NASL |
description | The remote host is running a version of FreeBSD 5.2 older than FreeBSD 5.2.1-p4 There is a programming error in the version of this kernel which may allow a local attacker to read portions of the kernel memory or to cause a system panic by misusing the setsockopt() system call on IPv6 sockets. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12613 |
published | 2004-07-06 |
reporter | This script is Copyright (C) 2004-2013 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/12613 |
title | FreeBSD : SA-04:06.ipv6 : setsockopt() |
code |
|
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc
- http://secunia.com/advisories/11233
- http://secunia.com/advisories/11233
- http://www.securityfocus.com/bid/9992
- http://www.securityfocus.com/bid/9992
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15662
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15662