// For flags

CVE-2007-2242

IPv6 routing headers issue

Severity Score

7.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.

El protocolo IPv6 permite a atacantes remotos provocar una denegación de servicio mediante cabeceras IPv6 de enrutamiento de tipo 0 (IPV6_RTHDR_TYPE_0) lo cual provoca amplificación de la red entre dos enrutadores.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-04-25 CVE Reserved
  • 2007-04-25 CVE Published
  • 2024-06-20 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (40)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=305712 X_refsource_confirm
http://docs.info.apple.com/article.html?artnum=306375 X_refsource_confirm
http://secunia.com/advisories/25033 Third Party Advisory
http://secunia.com/advisories/25068 Third Party Advisory
http://secunia.com/advisories/25083 Third Party Advisory
http://secunia.com/advisories/25288 Third Party Advisory
http://secunia.com/advisories/25691 Third Party Advisory
http://secunia.com/advisories/25770 Third Party Advisory
http://secunia.com/advisories/26133 Third Party Advisory
http://secunia.com/advisories/26620 Third Party Advisory
http://secunia.com/advisories/26651 Third Party Advisory
http://secunia.com/advisories/26664 Third Party Advisory
http://secunia.com/advisories/26703 Third Party Advisory
http://secunia.com/advisories/28806 Third Party Advisory
http://www.kb.cert.org/vuls/id/267289 Third Party Advisory
http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf X_refsource_misc
http://www.securityfocus.com/archive/1/467939/30/6690/threaded Mailing List
http://www.securityfocus.com/archive/1/471457 Mailing List
http://www.securitytracker.com/id?1017949 Vdb Entry
http://www.vupen.com/english/advisories/2007/1563 Vdb Entry
http://www.vupen.com/english/advisories/2007/2270 Vdb Entry
http://www.vupen.com/english/advisories/2007/3050 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/33851 Vdb Entry
https://issues.rpath.com/browse/RPL-1310 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9574 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
3.9
Search vendor "Openbsd" for product "Openbsd" and version "3.9"
-
Safe
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
4.0
Search vendor "Openbsd" for product "Openbsd" and version "4.0"
-
Safe
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
3.1
Search vendor "Netbsd" for product "Netbsd" and version "3.1"
-
Safe
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
3.1
Search vendor "Netbsd" for product "Netbsd" and version "3.1"
rc3
Safe
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
6.2
Search vendor "Freebsd" for product "Freebsd" and version "6.2"
-
Safe
Ietf
Search vendor "Ietf"
Ipv6
Search vendor "Ietf" for product "Ipv6"
*-
Affected
in Freebsd
Search vendor "Freebsd"
Freebsd
Search vendor "Freebsd" for product "Freebsd"
6.2
Search vendor "Freebsd" for product "Freebsd" and version "6.2"
stable
Safe