search menu icon-carat-right cmu-wordmark

CERT Coordination Center

IPv6 Type 0 Route Headers allow sender to control routing

Vulnerability Note VU#267289

Original Release Date: 2007-06-01 | Last Revised: 2011-07-22

Overview

IPv6 Type 0 Route Headers allow the sender to control packet routing. This vulnerability may allow an attacker to cause a denial-of-service condition.

Description

Routing header options provided by IPv6 allow packet senders to indicate specific nodes through which the packet should travel. Note that a node is defined as any device that implements IPv6, which includes hosts as well as routing devices. According to FreeBSD-SA-07:03.ipv6:

An attacker can "amplify" a denial of service attack against a link between two vulnerable hosts; that is, by sending a small volume of traffic the attacker can consume a much larger amount of bandwidth between the two vulnerable hosts.

An attacker can use vulnerable hosts to "concentrate" a denial of service attack against a victim host or network; that is, a set of packets sent over a period of 30 seconds or more could be constructed such that they all arrive at the victim within a period of 1 second or less.

Impact

This condition can facilitate a number of different impacts including packet amplification, bypassing filtering devices, denial of service, and defeating IPv6 Anycast.

Solution

Update

See the systems affected portion of this document for information about updates for specific vendors.

Vendor Information

267289
 

View all 73 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Philippe Biondi Arnaud Ebalard of EADS Innovation Works — IW/SE/CS, IT Sec lab, Suresnes, France at CanSecWest 2007.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2007-2242
Severity Metric: 11.03
Date Public: 2007-04-24
Date First Published: 2007-06-01
Date Last Updated: 2011-07-22 12:54 UTC
Document Revision: 39

Sponsored by CISA.