|
Message-Id: <201210102234.q9AMYdOm022710@linus.mitre.org> Date: Wed, 10 Oct 2012 18:34:39 -0400 (EDT) From: cve-assign@...re.org To: oss-security@...ts.openwall.com Cc: cve-assign@...re.org Subject: Re: Fwd: IPv6 DOS vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here are CVE assignments for these mixed open-source/closed-source issues: Windows: flood of ICMPv6 Neighbor Solicitation messages - CVE-2012-5362 (a different vulnerability than CVE-2010-4669) FreeBSD and NetBSD: flood of ICMPv6 Neighbor Solicitation messages - CVE-2012-5363 (a different vulnerability than CVE-2011-2393) (We're aware that it's possible for the observed IPv6 behavior to have different root causes on FreeBSD and NetBSD.) Mac OS X: flood of ICMPv6 Neighbor Solicitation messages - no CVE (There's no CVE assignment from MITRE because the observed impact is potentially reasonable for some design goals. It's possible that there will be a future CVE assignment by Apple.) Windows: flood of ICMPv6 Router Advertisement packets containing multiple Routing entries - CVE-2012-5364 FreeBSD and NetBSD: flood of ICMPv6 Router Advertisement packets containing multiple Routing entries - CVE-2012-5365 Mac OS X: flood of ICMPv6 Router Advertisement packets containing multiple Routing entries - CVE-2012-5366 (We're aware that it's possible for the observed IPv6 behavior to have the same root cause on Mac OS X as on both FreeBSD and NetBSD.) - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (SunOS) iQEcBAEBAgAGBQJQdfcdAAoJEGvefgSNfHMdA6UH/0bybnW/n6njAsiscsMCmqFo 9D8o4PrLrNquI2ybBtTtP0G0OJiGCsFKPDptWROf+T5cMt1BCrX1YC5Mh1wvwWSS fIg6gQSTS1D7NNf/gek6vu5geYpfAVMKuHGWl5+6+hHa1KwN1csQOcjGyoo6qGmd vb52lZ+Nnt7BqNwEKZjfNvfHIQ60NF0yM8DtDMMe0JTNPF414CO6gqUhdP5kiwtR jLOT92EJWoZ2Qi7I8arKvyCEagIl6PhZO84dycFaY1HcUjYpN0EoPTX4kJOdJ3BT f8SQilTvuNnYZWDm3kgXb/iSYeHkObfLgfwGDzVh/O2opFlBrU+3cct3oxFoEMw= =vWAY -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.