#VU10424 Improper input validation in OpenBSD
Published: February 8, 2018
Vulnerability identifier: #VU10424
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
OpenBSD
OpenBSD
Software vendor:
OpenBSD
OpenBSD
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPsec AH packets with IP options or IPv6 extension and cause the kernel to crash or hang.
The weakness exists due to improper input validation. A remote attacker can supply specially crafted IPsec AH packets with IP options or IPv6 extension and cause the kernel to crash or hang.
Remediation
Install update from vendor's website.