CVE-2008-2476

Current Description

The IPv6 Neighbor Discovery Protocol (NDP) implementation in (1) FreeBSD 6.3 through 7.1, (2) OpenBSD 4.2 and 4.3, (3) NetBSD, (4) Force10 FTOS before E7.7.1.1, (5) Juniper JUNOS, and (6) Wind River VxWorks 5.x through 6.4 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity) or read private network traffic via a spoofed message that modifies the Forward Information Base (FIB).

Referenced by CVEs:CVE-2008-4404, CVE-2009-0418

Basic Data

PublishedOctober 03, 2008
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score9.3
SeverityHIGH
Exploitability Score8.6
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSForce10Ftos********
    2.3OSFreebsdFreebsd6.3*******
    2.3OSFreebsdFreebsd7.1*******
    2.3OSJuniperJnos********
    2.3OSNetbsdNetbsd********
    2.3OSOpenbsdOpenbsd4.2*******
    2.3OSOpenbsdOpenbsd4.3*******
    2.3OSWindriverVxworks5*******
    2.3OSWindriverVxworks5.5*******
    2.3OSWindriverVxworks********6.4

Vulnerable Software List

VendorProductVersions
Freebsd Freebsd 6.3, 7.1
Openbsd Openbsd 4.2, 4.3
Netbsd Netbsd *
Windriver Vxworks *, 5, 5.5
Juniper Jnos *
Force10 Ftos *

References

NameSourceURLTags
NetBSD-SA2008-013ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-013.txt.ascNETBSD
32112http://secunia.com/advisories/32112SECUNIAVendor Advisory
32116http://secunia.com/advisories/32116SECUNIA
32117http://secunia.com/advisories/32117SECUNIAVendor Advisory
32133http://secunia.com/advisories/32133SECUNIA
32406http://secunia.com/advisories/32406SECUNIA
FreeBSD-SA-08:10http://security.freebsd.org/advisories/FreeBSD-SA-08:10.nd6.ascFREEBSDVendor Advisory
1020968http://securitytracker.com/id?1020968SECTRACK
http://support.apple.com/kb/HT3467http://support.apple.com/kb/HT3467CONFIRM
VU#472363http://www.kb.cert.org/vuls/id/472363CERT-VNUS Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7H2RY7http://www.kb.cert.org/vuls/id/MAPG-7H2RY7CONFIRMUS Government Resource
http://www.kb.cert.org/vuls/id/MAPG-7H2S68http://www.kb.cert.org/vuls/id/MAPG-7H2S68CONFIRMUS Government Resource
[4.2] 015: SECURITY FIX: October 2, 2008http://www.openbsd.org/errata42.html#015_ndpOPENBSD
[4.3] 006: SECURITY FIX: October 2, 2008http://www.openbsd.org/errata43.html#006_ndpOPENBSD
31529http://www.securityfocus.com/bid/31529BID
1021109http://www.securitytracker.com/id?1021109SECTRACK
1021132http://www.securitytracker.com/id?1021132SECTRACK
ADV-2008-2750http://www.vupen.com/english/advisories/2008/2750VUPEN
ADV-2008-2751http://www.vupen.com/english/advisories/2008/2751VUPEN
ADV-2008-2752http://www.vupen.com/english/advisories/2008/2752VUPEN
ADV-2009-0633http://www.vupen.com/english/advisories/2009/0633VUPEN
multiple-vendors-ndp-dos(45601)https://exchange.xforce.ibmcloud.com/vulnerabilities/45601XF
oval:org.mitre.oval:def:5670https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5670OVAL
https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-036&viewMode=viewhttps://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-036&viewModMISC