Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 10 Oct 2012 18:34:39 -0400 (EDT)
From: cve-assign@...re.org
To: oss-security@...ts.openwall.com
Cc: cve-assign@...re.org
Subject: Re: Fwd: IPv6 DOS vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Here are CVE assignments for these mixed open-source/closed-source
issues:

Windows: flood of ICMPv6 Neighbor Solicitation
         messages - CVE-2012-5362

  (a different vulnerability than CVE-2010-4669)


FreeBSD and NetBSD: flood of ICMPv6 Neighbor Solicitation
                    messages - CVE-2012-5363

  (a different vulnerability than CVE-2011-2393)

  (We're aware that it's possible for the observed IPv6 behavior to
   have different root causes on FreeBSD and NetBSD.)


Mac OS X: flood of ICMPv6 Neighbor Solicitation messages - no CVE

  (There's no CVE assignment from MITRE because the observed impact
   is potentially reasonable for some design goals. It's possible
   that there will be a future CVE assignment by Apple.)


Windows:  flood of ICMPv6 Router Advertisement packets
          containing multiple Routing entries - CVE-2012-5364


FreeBSD and NetBSD: flood of ICMPv6 Router Advertisement packets
          containing multiple Routing entries - CVE-2012-5365


Mac OS X: flood of ICMPv6 Router Advertisement packets
          containing multiple Routing entries - CVE-2012-5366

  (We're aware that it's possible for the observed IPv6 behavior to
   have the same root cause on Mac OS X as on both FreeBSD and
   NetBSD.)

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (SunOS)

iQEcBAEBAgAGBQJQdfcdAAoJEGvefgSNfHMdA6UH/0bybnW/n6njAsiscsMCmqFo
9D8o4PrLrNquI2ybBtTtP0G0OJiGCsFKPDptWROf+T5cMt1BCrX1YC5Mh1wvwWSS
fIg6gQSTS1D7NNf/gek6vu5geYpfAVMKuHGWl5+6+hHa1KwN1csQOcjGyoo6qGmd
vb52lZ+Nnt7BqNwEKZjfNvfHIQ60NF0yM8DtDMMe0JTNPF414CO6gqUhdP5kiwtR
jLOT92EJWoZ2Qi7I8arKvyCEagIl6PhZO84dycFaY1HcUjYpN0EoPTX4kJOdJ3BT
f8SQilTvuNnYZWDm3kgXb/iSYeHkObfLgfwGDzVh/O2opFlBrU+3cct3oxFoEMw=
=vWAY
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.