Description
Buffer overflow in kern/uipc_mbuf2.c in OpenBSD 3.9 and 4.0 allows remote attackers to execute arbitrary code via fragmented IPv6 packets due to "incorrect mbuf handling for ICMP6 packets." NOTE: this was originally reported as a denial of service.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alfredo Ortega · pythonremoteopenbsd
https://www.exploit-db.com/exploits/29725
References (10)
Core 10
Core References
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/986425
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1017735
Mailing List mailing-list
x_refsource_mlist
http://marc.info/?l=openbsd-cvs&m=117252151023868&w=2
Various Sources x_refsource_misc
http://www.coresecurity.com/?action=item&id=1703
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/33050
Various Sources vendor-advisory
x_refsource_openbsd
http://www.openbsd.org/errata40.html#m_dup1
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1017744
Patch vendor-advisory
x_refsource_openbsd
http://www.openbsd.org/errata39.html#m_dup1
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22901
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/24490
Scores
EPSS
0.4340
EPSS Percentile
97.5%
Details
Status
published
Products (2)
openbsd/openbsd
3.9
openbsd/openbsd
4.0
Published
Mar 10, 2007
Tracked Since
Feb 18, 2026