Vigil@nce - NetBSD: memory corruption via a fragmented IPv6 packet
April 2018 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker sending a fragmented IPv6 packet with specially packed
options, can generate a memory corruption in the NetBSD kernel, in
order to trigger a denial of service.
Impacted products: NetBSD.
Severity: 2/4.
Creation date: 13/02/2018.
DESCRIPTION OF THE VULNERABILITY
An attacker sending a fragmented IPv6 packet with specially packed
options, can generate a memory corruption in the NetBSD kernel, in
order to trigger a denial of service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/NetBSD-memory-corruption-via-a-fragmented-IPv6-packet-25282