Vulnerability Name: | CVE-2008-4404 (CCN-45601) |
Assigned: | 2008-10-02 |
Published: | 2008-10-02 |
Updated: | 2008-10-03 |
Summary: | The IPv6 Neighbor Discovery Protocol (NDP) implementation on IBM zSeries servers does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB), a related issue to CVE-2008-2476.
|
CVSS v3 Severity: | 6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P) 4.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-20
|
Vulnerability Consequences: | Denial of Service |
References: | Source: CCN Type: NetBSD Security Advisory 2008-013 IPv6 Neighbor Discovery Protocol
Source: MITRE Type: CNA CVE-2008-2476
Source: MITRE Type: CNA CVE-2008-4404
Source: MITRE Type: CNA CVE-2009-0418
Source: CCN Type: HP Security Bulletin HPSBUX02407 SSRT080107 rev.1 HP-UX Running IPv6, Remote Denial of Service (DoS) and Unauthorized Access
Source: CCN Type: SA32112 FreeBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
Source: CCN Type: SA32116 Juniper Products Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
Source: CCN Type: SA32117 Force10 FTOS Routers IPv6 Neighbor Discovery Protocol Vulnerability
Source: CCN Type: SA32133 OpenBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
Source: CCN Type: SA32406 NetBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
Source: CCN Type: SA33787 HP-UX IPv6 Neighbor Discovery Protocol Neighbor Solicitation Vulnerability
Source: CCN Type: SA34105 Apple Airport Extreme / Time Capsule Multiple Vulnerabilities
Source: CCN Type: FreeBSD-SA-08:10.nd6 IPv6 Neighbor Discovery Protocol routing vulnerability
Source: CCN Type: SECTRACK ID: 1020968 FreeBSD IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases
Source: CCN Type: SECTRACK ID: 1021109 NetBSD IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases
Source: CCN Type: SECTRACK ID: 1021132 OpenBSD IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases
Source: CCN Type: SECTRACK ID: 1021660 HP-UX IPv6 Neighbor Discovery Protocol Spoofing Bug Lets Remote Users Modify Routing Data in Certain Cases
Source: CCN Type: Apple Web site About the security content of Time Capsule and AirPort Base Station (802.11n*) Firmware 7.4.1
Source: CCN Type: ASA-2009-059 HP-UX Running IPv6 Remote Denial of Service (DoS) and Unauthorized Access (HPSBUX02407)
Source: CCN Type: Wind River Web site Wind River Support
Source: CCN Type: Force10 Networks Web site Force10 Networks
Source: CCN Type: FreeBSD Web site The FreeBSD Project
Source: CCN Type: US-CERT VU#472363 IPv6 implementations insecurely update Forwarding Information Base
Source: CERT-VN Type: US Government Resource VU#472363
Source: CCN Type: US-CERT Advisory, 2008-09-30 Force10 Networks, Inc. Information for VU#472363
Source: MISC Type: US Government Resource http://www.kb.cert.org/vuls/id/MAPG-7H2RZ8
Source: CCN Type: OSVDB ID: 48702 FreeBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 48744 OpenBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 48745 Force10 FTOS Routers IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 48989 Juniper Multiple Products IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 48991 IBM zSeries IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 49407 NetBSD IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 51771 HP-UX IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: OSVDB ID: 52494 Apple Multiple Products IPv6 Neighbor Discovery Protocol Neighbor Solicitation Spoofing
Source: CCN Type: BID-31529 Multiple Vendors IPv6 Neighbor Discovery Protocol Implementation Address Spoofing Vulnerability
Source: CCN Type: BID-33560 Novell GroupWise Internet Agent SMTP RCPT Command Remote Buffer Overflow Vulnerability
Source: XF Type: UNKNOWN multiple-vendor-ndp-dos(45601)
Source: CCN Type: Juniper Networks Web site Juniper Networks :: Login
|
Vulnerable Configuration: | Configuration 1: cpe:/o:ibm:zseries:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:6.0:-:*:*:*:*:*:*OR cpe:/o:netbsd:netbsd:3.0:*:*:*:*:*:*:*OR cpe:/o:netbsd:netbsd:3.1:*:*:*:*:*:*:*OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:6.3:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:7.0:-:*:*:*:*:*:*OR cpe:/o:netbsd:netbsd:4.0:*:*:*:*:*:*:*OR cpe:/a:apple:apple_airport_extreme_base_station:::7.3.1_firmware:*:*:*:*:*OR cpe:/o:freebsd:freebsd:6.4:-:*:*:*:*:*:*OR cpe:/o:force10:ftos:*:*:*:*:*:*:*:*OR cpe:/o:ibm:zseries:*:*:*:*:*:*:*:*OR cpe:/o:juniper:jnos:*:*:*:*:*:*:*:*OR cpe:/h:apple:airport_express_base_station_firmware:3.84:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |