Overview
The KAME project's IPv6 implementation does not properly process IPv6 packets that contain the IPComp header. If exploited, this vulnerability may allow an attacker to cause a vulnerable system to crash.
Description
Per RFC 3173: IP payload compression is a protocol to reduce the size of IP datagrams. This protocol will increase the overall communication performance between a pair of communicating hosts/gateways ("nodes") by compressing the datagrams, provided the nodes have sufficient computation power, through either CPU capacity or a compression coprocessor, and the communication is over slow or congested links. |
Impact
A remote, unauthenticated attacker can cause a vulnerable system to crash. |
Solution
See the systems affected section of this document for a partial list of affected vendors. Administrators who compile their kernel from source should see http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37 for more information. |
Restrict access |
Vendor Information
Apple Computer, Inc. Affected
Notified: November 30, 2007 Updated: May 29, 2008
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Addendum
See http://support.apple.com/kb/HT1897 for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Force10 Networks, Inc. Affected
Notified: November 30, 2007 Updated: February 06, 2008
Statement Date: February 05, 2008
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Addendum
Force10 Networks' switch/router product lines can be affected by this vulnerability in older FTOS versions. The problem was corrected in FTOS version 7.6.1.0.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
FreeBSD, Inc. Affected
Notified: November 30, 2007 Updated: February 27, 2008
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Addendum
From http://security.freebsd.org/advisories/FreeBSD-SA-08:04.ipsec.asc
No workaround is available, but kernels which does not include IPsec support are not vulnerable. The GENERIC and SMP kernel configurations distributed with FreeBSD releases do not include IPsec support.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Juniper Networks, Inc. Affected
Notified: November 30, 2007 Updated: February 07, 2008
Status
Affected
Vendor Statement
All JUNOS software built on or after December 8, 2007 has been corrected to properly manage IPv6 packet buffers and is not susceptible to this vulnerability. JUNOS releases 8.5R1 and beyond are NOT susceptible to this vulnerability because a revised IPv6 protocol stack was implemented.
No other Juniper products are affected by this vulnerability.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
KAME Project Affected
Notified: February 05, 2008 Updated: February 07, 2008
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
NetBSD Affected
Notified: November 30, 2007 Updated: December 12, 2007
Status
Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
QNX, Software Systems, Inc. Affected
Notified: November 30, 2007 Updated: February 01, 2008
Statement Date: February 01, 2008
Status
Affected
Vendor Statement
QNX Software Systems has verified that vulnerability VU#110947 is present in products which contain the IPv6 version of the TCP/IP network stack. This issue has been corrected in patch 933-CERT-VU110947 for QNX Momentics 6.3.2 and 6.3.0 SP3 Extended Networking TDK 1.0.1.
Please contact your QNX representative to obtain this patch, or for more information regarding older QNX releases and how to determine if you are using the affected binary.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Borderware Technologies Not Affected
Notified: November 30, 2007 Updated: January 30, 2008
Statement Date: January 29, 2008
Status
Not Affected
Vendor Statement
No Borderware products are affected by this vulnerability.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Cisco Systems, Inc. Not Affected
Notified: November 30, 2007 Updated: February 08, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Computer Associates Not Affected
Notified: November 30, 2007 Updated: February 01, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Computer Associates eTrust Security Management Not Affected
Notified: November 30, 2007 Updated: February 01, 2008
Status
Not Affected
Vendor Statement
We have investigated and determined that no CA products are vulnerable to this issue.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Debian GNU/Linux Not Affected
Notified: November 30, 2007 Updated: March 16, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Addendum
Debian GNU/Linux is not affected by this issue.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Extreme Networks Not Affected
Notified: November 30, 2007 Updated: April 29, 2009
Statement Date: April 29, 2009
Status
Not Affected
Vendor Statement
Extreme Networks products are not vulnerable to this issue.
Vendor Information
The vendor has not provided us with any further information regarding this vulnerability.
Foundry Networks, Inc. Not Affected
Notified: November 30, 2007 Updated: April 03, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Global Technology Associates Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Hitachi Not Affected
Notified: November 30, 2007 Updated: February 01, 2008
Statement Date: January 28, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
IBM Corporation Not Affected
Notified: November 30, 2007 Updated: February 06, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Internet Security Systems, Inc. Not Affected
Notified: November 30, 2007 Updated: February 06, 2008
Statement Date: December 04, 2007
Status
Not Affected
Vendor Statement
IBM Internet Security Systems does NOT use this code at all in our products. Thus we are not vulnerable to this issue and are unaffected.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Intoto Not Affected
Notified: November 30, 2007 Updated: February 08, 2008
Status
Not Affected
Vendor Statement
Intoto's iGateway VPN is not vulnerable to the exploit documented in this vulnerability note, because it is not a derivative of KAME project.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Linux Kernel Archives Not Affected
Updated: February 13, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
McAfee Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Novell, Inc. Not Affected
Notified: November 30, 2007 Updated: February 01, 2008
Statement Date: February 01, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Redback Networks, Inc. Not Affected
Notified: November 30, 2007 Updated: February 05, 2008
Statement Date: February 05, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Secure Computing Network Security Division Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Statement Date: December 06, 2007
Status
Not Affected
Vendor Statement
We have investigated all of our IPv6-capable products, including our Sidewinder SnapGear, and TSP product lines. None of them contain the relevant code or are otherwise affected by the issue.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
SmoothWall Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Statement Date: December 03, 2007
Status
Not Affected
Vendor Statement
SmoothWall products do not use KAME for their IPSec implementation; they use Linux-based FreeS/WAN code. We are therefore not vulnerable to this exploit.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Sun Microsystems, Inc. Not Affected
Notified: November 30, 2007 Updated: February 06, 2008
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Addendum
Sun can confirm that it is not impacted by this issue described in CERT advisory VU#110947.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
The SCO Group Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
TippingPoint, Technologies, Inc. Not Affected
Notified: November 30, 2007 Updated: December 12, 2007
Status
Not Affected
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
3com, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
AT&T Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Alcatel Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Avaya, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Avici Systems, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Bro Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
CentOS Unknown
Notified: January 21, 2008 Updated: January 21, 2008
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Charlotte's Web Networks Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Check Point Software Technologies Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Chiaro Networks, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Clavister Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Conectiva Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Cray Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
D-Link Systems, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Data Connection, Ltd. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
EMC Corporation Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Engarde Secure Linux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Enterasys Networks Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Ericsson Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
F5 Networks, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Fedora Project Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Fortinet, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Fujitsu Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Gentoo Linux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Hewlett-Packard Company Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Hyperchip Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
IBM Corporation (zseries) Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
IBM eServer Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
IP Filter Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Ingrian Networks, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Intel Corporation Unknown
Notified: January 21, 2008 Updated: February 01, 2008
Statement Date: January 21, 2008
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Linksys (A division of Cisco Systems) Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Lucent Technologies Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Luminous Networks Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Mandriva, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Microsoft Corporation Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
MontaVista Software, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Multinet (owned Process Software Corporation) Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Multitech, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
NEC Corporation Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Network Appliance, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
NextHop Technologies, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Nokia Unknown
Notified: February 05, 2008 Updated: February 05, 2008
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Nortel Networks, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
OpenBSD Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Openwall GNU/*/Linux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
PC-BSD Unknown
Notified: February 05, 2008 Updated: February 05, 2008
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
RadWare, Inc. Unknown
Notified: February 05, 2008 Updated: February 05, 2008
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Red Hat, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Riverstone Networks, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
SUSE Linux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Secureworx, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Silicon Graphics, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Slackware Linux Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Snort Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Sony Corporation Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Sourcefire Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Stonesoft Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Symantec, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Trustix Secure Linux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Turbolinux Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Ubuntu Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Unisys Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Watchguard Technologies, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
Wind River Systems, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
ZyXEL Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
eSoft, Inc. Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
m0n0wall Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
netfilter Unknown
Notified: November 30, 2007 Updated: November 30, 2007
Status
Unknown
Vendor Statement
We have not received a statement from the vendor.
Vendor Information
We are not aware of further vendor information regarding this vulnerability.
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.kame.net/dev/cvsweb2.cgi/kame/kame/sys/netinet6/ipcomp_input.c.diff?r1=1.36;r2=1.37
- http://www.kame.net/
- http://www.ietf.org/rfc/rfc3173.txt
- http://secunia.com/advisories/28816/
- http://secunia.com/advisories/28788/
- http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet6/ipcomp_input.c?f=u&only_with_tag=netbsd-3-1
- http://jvn.jp/cert/JVNVU%23110947/
- http://www.milw0rm.com/exploits/5191
Acknowledgements
Thanks to Shoichi Sakane of the KAME project for reporting this vulnerability.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2008-0177 |
Severity Metric: | 4.39 |
Date Public: | 2008-02-06 |
Date First Published: | 2008-02-06 |
Date Last Updated: | 2009-04-29 17:59 UTC |
Document Revision: | 38 |