Memory corruption in NetBSD - #VU10459
Published: February 12, 2018 / Updated: March 9, 2018
NetBSD
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing IPv6 packets within "src/sys/netinet6/frag6.c" file. A remote unauthenticated attacker can send a series of specially crafted IPv6 packets, trigger memory corruption and cause denial of service conditions or execute arbitrary code on the target system.
Successful exploitation of this vulnerability may allow an attacker to remotely execute arbitrary code on the vulnerable system with kernel privileges.
This is a highly critical vulnerability, since IPv6 support is enabled by default in NetBSD.