// For flags

CVE-2009-0687

Multiple Vendor - PF Null Pointer Dereference

Severity Score

7.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.

La función pf_test_rule de OpenBSD Packet Filter (PF), tal como es usada en OpenBSD v4.2 hasta v4.5, NetBSD v5.0 anterior a RC3, MirOS v10 y anteriores y MidnightBSD v0.3 hasta la versión actual permite a atacantes remotos causar una denegación de servicio a través de paquetes IP modificados que provocan una "desreferencia" de un puntero nulo relacionada con un paquete IPv4 con datos ("payload") ICMPv6.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2009-02-22 CVE Reserved
  • 2009-04-14 First Exploit
  • 2009-08-11 CVE Published
  • 2023-08-14 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-399: Resource Management Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Midnightbsd
Search vendor "Midnightbsd"
Midnightbsd
Search vendor "Midnightbsd" for product "Midnightbsd"
0.3-current
Search vendor "Midnightbsd" for product "Midnightbsd" and version "0.3-current"
-
Affected
Mirbsd
Search vendor "Mirbsd"
Miros
Search vendor "Mirbsd" for product "Miros"
<= 10
Search vendor "Mirbsd" for product "Miros" and version " <= 10"
-
Affected
Netbsd
Search vendor "Netbsd"
Netbsd
Search vendor "Netbsd" for product "Netbsd"
5.0
Search vendor "Netbsd" for product "Netbsd" and version "5.0"
-
Affected
Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
4.2
Search vendor "Openbsd" for product "Openbsd" and version "4.2"
-
Affected
Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
4.3
Search vendor "Openbsd" for product "Openbsd" and version "4.3"
-
Affected
Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
4.4
Search vendor "Openbsd" for product "Openbsd" and version "4.4"
-
Affected
Openbsd
Search vendor "Openbsd"
Openbsd
Search vendor "Openbsd" for product "Openbsd"
4.5
Search vendor "Openbsd" for product "Openbsd" and version "4.5"
-
Affected