4 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

14 Jan 2025 — IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136. • https://datatracker.ietf.org/doc/html/rfc2473 • CWE-940: Improper Verification of Source of a Communication Channel •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

14 Jan 2025 — IPv6-in-IPv4 tunneling (RFC 4213) allows an attacker to spoof and route traffic via an exposed network interface. • https://datatracker.ietf.org/doc/html/rfc4213 • CWE-940: Improper Verification of Source of a Communication Channel •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

14 Jan 2017 — An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perf... • http://rhn.redhat.com/errata/RHSA-2017-0817.html • CWE-17: DEPRECATED: Code CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •

CVSS: 7.8EPSS: 32%CPEs: 9EXPL: 0

25 Apr 2007 — The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers. El protocolo IPv6 permite a atacantes remotos provocar una denegación de servicio mediante cabeceras IPv6 de enrutamiento de tipo 0 (IPV6_RTHDR_TYPE_0) lo cual provoca amplificación de la red entre dos enrutadores. • http://docs.info.apple.com/article.html?artnum=305712 •