OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

BID:22901

Info

OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

Bugtraq ID: 22901
Class: Boundary Condition Error
CVE: CVE-2007-1365
Remote: Yes
Local: No
Published: Mar 09 2007 12:00AM
Updated: Nov 03 2007 12:06AM
Credit: Alfredo Ortega from Core Security Technologies is credited with the discovery of this vulnerability.
Vulnerable: OpenBSD OpenBSD 4.1
OpenBSD OpenBSD 4.0
OpenBSD OpenBSD 3.9
OpenBSD OpenBSD 3.8
OpenBSD OpenBSD 3.6
OpenBSD OpenBSD 3.1
Not Vulnerable:

Discussion

OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

OpenBSD is prone to a remote buffer-overflow vulnerability because the software fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

A remote attacker can exploit this issue to execute arbitrary code with kernel-level privileges or to crash the affected computer. Successful exploits will result in a complete compromise of vulnerable computers or cause denial-of-service conditions.

Exploit / POC

OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

An attacker can exploit this issue by using standard network utilities.

UPDATE: Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

The following exploit code is available:

Solution / Fix

OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

Solution:
The vendor released updates to address this issue. Please see the references for more information.


OpenBSD OpenBSD 4.0

OpenBSD OpenBSD 3.9

References

OpenBSD ICMPV6 Packet Handling Remote Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report