CVE-2007-1365

Openbsd - Buffer Overflow

Title source: rule
STIX 2.1

Description

Buffer overflow in kern/uipc_mbuf2.c in OpenBSD 3.9 and 4.0 allows remote attackers to execute arbitrary code via fragmented IPv6 packets due to "incorrect mbuf handling for ICMP6 packets." NOTE: this was originally reported as a denial of service.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Alfredo Ortega · pythonremoteopenbsd
https://www.exploit-db.com/exploits/29725

References (10)

Core 10
Core References
US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/986425
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1017735
Mailing List mailing-list x_refsource_mlist
http://marc.info/?l=openbsd-cvs&m=117252151023868&w=2
Various Sources x_refsource_misc
http://www.coresecurity.com/?action=item&id=1703
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/33050
Various Sources vendor-advisory x_refsource_openbsd
http://www.openbsd.org/errata40.html#m_dup1
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1017744
Patch vendor-advisory x_refsource_openbsd
http://www.openbsd.org/errata39.html#m_dup1
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22901
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24490

Scores

EPSS 0.4340
EPSS Percentile 97.5%

Details

Status published
Products (2)
openbsd/openbsd 3.9
openbsd/openbsd 4.0
Published Mar 10, 2007
Tracked Since Feb 18, 2026