Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-3530 | First vendor Publication | 2008-09-05 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.1 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
sys/netinet6/icmp6.c in the kernel in FreeBSD 6.3 through 7.1, NetBSD 3.0 through 4.0, and possibly other operating systems does not properly check the proposed new MTU in an ICMPv6 Packet Too Big Message, which allows remote attackers to cause a denial of service (panic) via a crafted Packet Too Big Message. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3530 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 3 |
OpenVAS Exploits
Date | Description |
---|---|
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-08:09.icmp6.asc) File : nvt/freebsdsa_icmp6.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
52493 | Apple Multiple Products ICMPv6 Packet Too Big Message MTU Remote DoS |
47919 | Multiple BSD ICMPv6 Packet Too Big Message MTU Remote DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-04 | Name : The remote server is affected by a signature validation bypass vulnerability. File : openssl_0_9_8j.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_7.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:13:34 |
|
2024-11-28 12:16:14 |
|
2024-08-02 12:09:36 |
|
2024-08-02 01:02:45 |
|
2024-02-02 01:09:10 |
|
2024-02-01 12:02:43 |
|
2023-09-05 12:08:32 |
|
2023-09-05 01:02:35 |
|
2023-09-02 12:08:40 |
|
2023-09-02 01:02:35 |
|
2023-08-12 12:10:13 |
|
2023-08-12 01:02:35 |
|
2023-08-11 12:08:43 |
|
2023-08-11 01:02:41 |
|
2023-08-06 12:08:20 |
|
2023-08-06 01:02:37 |
|
2023-08-04 12:08:25 |
|
2023-08-04 01:02:40 |
|
2023-07-14 12:08:24 |
|
2023-07-14 01:02:37 |
|
2023-03-29 01:09:34 |
|
2023-03-28 12:02:43 |
|
2022-10-11 12:07:28 |
|
2022-10-11 01:02:27 |
|
2021-05-04 12:07:53 |
|
2021-04-22 01:08:14 |
|
2020-05-23 00:22:04 |
|
2019-03-19 12:02:51 |
|
2017-08-08 09:24:18 |
|
2016-04-26 17:42:53 |
|
2014-02-17 10:45:59 |
|
2013-05-11 00:22:59 |
|