Vulnerability Name:

CVE-2001-0993 (CCN-6908)

Assigned:2001-07-20
Published:2001-07-20
Updated:2017-10-10
Summary:sendmsg function in NetBSD 1.3 through 1.5 allows local users to cause a denial of service (kernel trap or panic) via a msghdr structure with a large msg_controllen length.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: NetBSD Security Advisory 2000-011
Insufficient msg_controllen checking for sendmsg(2)

Source: NETBSD
Type: Patch, Vendor Advisory
NetBSD-SA2001-011

Source: MITRE
Type: CNA
CVE-2001-0993

Source: OSVDB
Type: UNKNOWN
1910

Source: CCN
Type: OSVDB ID: 1910
NetBSD sendmsg msg_controllen DoS

Source: BID
Type: Patch, Vendor Advisory
3088

Source: CCN
Type: BID-3088
NetBSD sendmsg Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
bsd-kernel-sendmsg-dos(6908)

Source: XF
Type: UNKNOWN
bsd-kernel-sendmsg-dos(6908)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netbsd:netbsd:1.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:netbsd:netbsd:1.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netbsd netbsd 1.3
    netbsd netbsd 1.3.1
    netbsd netbsd 1.3.2
    netbsd netbsd 1.3.3
    netbsd netbsd 1.4
    netbsd netbsd 1.4.1
    netbsd netbsd 1.4.2
    netbsd netbsd 1.4.3
    netbsd netbsd 1.5
    netbsd netbsd 1.3
    netbsd netbsd 1.3.1
    netbsd netbsd 1.3.3
    netbsd netbsd 1.3.2
    netbsd netbsd 1.4.1
    netbsd netbsd 1.4.2
    netbsd netbsd 1.4
    netbsd netbsd 1.5
    netbsd netbsd 1.4.3