The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.
2009-08-11T10:30:00.217
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.8 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:C
10.0
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | midnightbsd | midnightbsd | 0.3-current | Yes |
Operating System | mirbsd | miros | ≤ 10 | Yes |
Operating System | netbsd | netbsd | 5.0 | Yes |
Operating System | openbsd | openbsd | 4.2 | Yes |
Operating System | openbsd | openbsd | 4.3 | Yes |
Operating System | openbsd | openbsd | 4.4 | Yes |
Operating System | openbsd | openbsd | 4.5 | Yes |