Description
FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Product(s):
- FreeBSD 3.0
- FreeBSD 3.1
- FreeBSD 3.2
- FreeBSD 3.3
- FreeBSD 3.3 Release Candidate
- FreeBSD 3.4
- FreeBSD 3.5
- FreeBSD 4.0
- FreeBSD 5.0 Alpha
- NetBSD 1.4.1 Alpha
- NetBSD 1.4.1 on ARM32
- NetBSD 1.4.1 on SPARC
- NetBSD 1.4.1 on X86
- NetBSD 1.4.2 on Alpha
- NetBSD 1.4.2 on ARM32
- NetBSD 1.4.2 on SPARC
- NetBSD 1.4.2 on X86
- NetBSD 1.4 on x86
- OpenBSD 2.5
- OpenBSD 2.6
- OpenBSD 2.7
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2000-0489, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2000-0489 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.