Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2009-0687


The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.


Published

2009-08-11T10:30:00.217

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.8 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Primary
    CWE-399

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System midnightbsd midnightbsd 0.3-current Yes
Operating System mirbsd miros ≤ 10 Yes
Operating System netbsd netbsd 5.0 Yes
Operating System openbsd openbsd 4.2 Yes
Operating System openbsd openbsd 4.3 Yes
Operating System openbsd openbsd 4.4 Yes
Operating System openbsd openbsd 4.5 Yes

References