Vulnerability Name:

CVE-2004-0370 (CCN-15662)

Assigned:2004-03-29
Published:2004-03-29
Updated:2017-07-11
Summary:The setsockopt call in the KAME Project IPv6 implementation, as used in FreeBSD 5.2, does not properly handle certain IPv6 socket options, which could allow attackers to read kernel memory and cause a system panic.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-04:06.ipv6
setsockopt(2) IPv6 sockets input validation error

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-04:06

Source: MITRE
Type: CNA
CVE-2004-0370

Source: CCN
Type: SA11233
FreeBSD IPv6 "setsockopt()" Input Validation Vulnerability

Source: SECUNIA
Type: UNKNOWN
11233

Source: CCN
Type: OSVDB ID: 4668
FreeBSD KAME Project IPv6 setsockopt() DoS

Source: CCN
Type: OSVDB ID: 5985
FreeBSD KAME Project IPv6 setsockopt() Kernel Memory Disclosure

Source: BID
Type: UNKNOWN
9992

Source: CCN
Type: BID-9992
FreeBSD IPv6 Socket Options Handling Local Memory Disclosure Vulnerability

Source: XF
Type: UNKNOWN
freebsd-ipv6-dos(15662)

Source: XF
Type: UNKNOWN
freebsd-ipv6-dos(15662)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:5.2:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 5.2
    freebsd freebsd 5.2