A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
References
Link | Resource |
---|---|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc | Mitigation Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230804-0001/ | Third Party Advisory |
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc | Mitigation Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230804-0001/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service. |
Information
Published : 2023-08-01 23:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-3107
Mitre link : CVE-2023-3107
CVE.ORG link : CVE-2023-3107
JSON object : View
Products Affected
freebsd
- freebsd
netapp
- clustered_data_ontap
CWE
CWE-190
Integer Overflow or Wraparound