Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-3605 | First vendor Publication | 2014-02-17 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:14652 | |||
Oval ID: | oval:org.mitre.oval:def:14652 | ||
Title: | USN-1257-1 -- radvd vulnerabilities | ||
Description: | radvd: Router Advertisement Daemon radvd could be made to crash or overwrite certain files if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1257-1 CVE-2011-3601 CVE-2011-3602 CVE-2011-3604 CVE-2011-3605 | Version: | 5 |
Platform(s): | Ubuntu 11.04 Ubuntu 11.10 Ubuntu 10.04 Ubuntu 10.10 | Product(s): | radvd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:15181 | |||
Oval ID: | oval:org.mitre.oval:def:15181 | ||
Title: | DSA-2323-1 radvd -- several | ||
Description: | Multiple security issues were discovered by Vasiliy Kulikov in radvd, an IPv6 Router Advertisement daemon: CVE-2011-3602 set_interface_var function doesnt check the interface name, which is chosen by an unprivileged user. This could lead to an arbitrary file overwrite if the attacker has local access, or specific files overwrites otherwise. CVE-2011-3604 process_ra function lacks multiple buffer length checks which could lead to memory reads outside the stack, causing a crash of the daemon. CVE-2011-3605 process_rs function calls mdelay unconditionnally when running in unicast-only mode. As this call is in the main thread, that means all request processing is delayed. An attacked could flood the daemon with router solicitations in order to fill the input queue, causing a temporary denial of service. Note: upstream and Debian default is to use anycast mode. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2323-1 CVE-2011-3602 CVE-2011-3604 CVE-2011-3605 | Version: | 7 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | radvd |
Definition Synopsis: | |||
|
OpenVAS Exploits
Date | Description |
---|---|
2012-04-02 | Name : Fedora Update for radvd FEDORA-2011-13989 File : nvt/gb_fedora_2011_13989_radvd_fc16.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201111-08 (radvd) File : nvt/glsa_201111_08.nasl |
2012-02-11 | Name : Debian Security Advisory DSA 2323-1 (radvd) File : nvt/deb_2323_1.nasl |
2011-11-11 | Name : Ubuntu Update for radvd USN-1257-1 File : nvt/gb_ubuntu_USN_1257_1.nasl |
2011-10-31 | Name : Fedora Update for radvd FEDORA-2011-14000 File : nvt/gb_fedora_2011_14000_radvd_fc14.nasl |
2011-10-31 | Name : Fedora Update for radvd FEDORA-2011-14022 File : nvt/gb_fedora_2011_14022_radvd_fc15.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76131 | radvd process_rs() Function mdelay() Call ND_ROUTER_SOLICIT Saturation DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_radvd-111021.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_radvd-111021.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_radvd-111109.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_radvd-7824.nasl - Type : ACT_GATHER_INFO |
2011-11-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201111-08.nasl - Type : ACT_GATHER_INFO |
2011-11-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1257-1.nasl - Type : ACT_GATHER_INFO |
2011-11-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-13989.nasl - Type : ACT_GATHER_INFO |
2011-10-31 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2323.nasl - Type : ACT_GATHER_INFO |
2011-10-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-14000.nasl - Type : ACT_GATHER_INFO |
2011-10-27 | Name : The remote Fedora host is missing a security update. File : fedora_2011-14022.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 22:54:20 |
|
2024-11-28 12:27:18 |
|
2021-04-22 01:20:57 |
|
2020-05-23 01:46:43 |
|
2020-05-23 00:31:11 |
|
2016-07-28 01:01:43 |
|
2014-06-14 13:31:41 |
|
2014-02-18 21:21:02 |
|
2014-02-17 21:21:06 |
|