Vulnerabilities > CVE-2006-0381 - Remote Denial Of Service vulnerability in Freebsd 5.3/5.4/6.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
freebsd

Summary

A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice.

Vulnerable Configurations

Part Description Count
OS
Freebsd
9

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 16375 CVE(CAN) ID: CVE-2006-0381 OpenBSD是一款开放源代码Unix类操作系统。 OpenBSD内核的报文分片处理模块存在漏洞,远程攻击者可利用此漏洞对服务器进行拒绝服务攻击。 远程攻击者可能通过精心构造的恶意分片报文导致内核崩溃。 FreeBSD FreeBSD 6.0-STABLE FreeBSD FreeBSD 6.0-RELEASE FreeBSD FreeBSD 5.4 FreeBSD FreeBSD 5.3 OpenBSD OpenBSD current OpenBSD OpenBSD 3.8 OpenBSD OpenBSD 3.7 FreeBSD ------- FreeBSD已经为此发布了一个安全公告(FreeBSD-SA-06:07)以及相应补丁: FreeBSD-SA-06:07:IP fragment handling panic in pf(4) 链接:<a href=ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc target=_blank>ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc</a> 补丁下载: # fetch <a href=ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:07/pf.patch target=_blank>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:07/pf.patch</a> # fetch <a href=ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:07/pf.patch.asc target=_blank>ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-06:07/pf.patch.asc</a> OpenBSD ------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&amp;r2=1.104 target=_blank>http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&amp;r2=1.104</a>
idSSV:4230
last seen2017-11-19
modified2006-08-20
published2006-08-20
reporterRoot
titleOpenBSD PF IP分片拒绝服务漏洞