Improper input validation in OpenBSD - #VU10424
Published: February 8, 2018
Vulnerability identifier: #VU10424
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: OpenBSD
Affected software:
OpenBSD
OpenBSD
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPsec AH packets with IP options or IPv6 extension and cause the kernel to crash or hang.
The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPsec AH packets with IP options or IPv6 extension and cause the kernel to crash or hang.
Remediation
Install update from vendor's website.