CVE-2009-0687
Summary
| CVE | CVE-2009-0687 |
|---|---|
| State | PUBLISHED |
| Assigner | certcc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-08-11 10:30:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
CompleteAV:N/AC:L/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Midnightbsd | Midnightbsd | 0.3-current | All | All | All |
| Operating System | Mirbsd | Miros | All | All | All | All |
| Operating System | Netbsd | Netbsd | 5.0 | All | All | All |
| Operating System | Openbsd | Openbsd | 4.2 | All | All | All |
| Operating System | Openbsd | Openbsd | 4.3 | All | All | All |
| Operating System | Openbsd | Openbsd | 4.4 | All | All | All |
| Operating System | Openbsd | Openbsd | 4.5 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| OpenBSD 4.5 errata | af854a3a-2127-422b-91ae-364da2661108 | www.openbsd.org | Patch, Vendor Advisory |
| OpenBSD 4.3 errata | af854a3a-2127-422b-91ae-364da2661108 | www.openbsd.org | Patch, Vendor Advisory |
| ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-001.txt.asc | af854a3a-2127-422b-91ae-364da2661108 | ftp.netbsd.org | Vendor Advisory |
| Multiple Vendor PF Null Pointer Dereference Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Patch, Vendor Advisory |
| Loading... | af854a3a-2127-422b-91ae-364da2661108 | www.helith.net | |
| ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch | af854a3a-2127-422b-91ae-364da2661108 | ftp.openbsd.org | Patch, Vendor Advisory |
| OpenBSD 4.4 errata | af854a3a-2127-422b-91ae-364da2661108 | www.openbsd.org | Patch, Vendor Advisory |
| OpenBSD 4.5 - IP datagrams Remote Denial of Service - OpenBSD dos Exploit | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| www.osvdb.org/53608 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.