Description
NetBSD 1.5 and earlier and FreeBSD 4.3 and earlier allows a remote attacker to cause a denial of service by sending a large number of IP fragments to the machine, exhausting the mbuf pool.
Products
- FreeBSD
- FreeBSD
- FreeBSD 0.4_1
- FreeBSD 1.0
- FreeBSD 1.1.5.1
- FreeBSD 1.1.5
- FreeBSD 1.1
- FreeBSD 1.2
- FreeBSD 1.5
- FreeBSD 2.0.1
- FreeBSD 2.0.5
- FreeBSD 2.0
- FreeBSD 2.1.0
- FreeBSD 2.1.5
- FreeBSD 2.1.6.1
- FreeBSD 2.1.6
- FreeBSD 2.1.7.1
- FreeBSD 2.1.7
- FreeBSD 2.1
- FreeBSD 2.2.1
- FreeBSD 2.2.2
- FreeBSD 2.2.3
- FreeBSD 2.2.4
- FreeBSD 2.2.5
- FreeBSD 2.2.6
- FreeBSD 2.2.7
- FreeBSD 2.2.8
- FreeBSD 2.2
- FreeBSD 3.0
- FreeBSD 3.1
- FreeBSD 3.2
- FreeBSD 3.3
- FreeBSD 3.3
- FreeBSD 3.3 Release Candidate
- FreeBSD 3.4
- FreeBSD 3.5.1
- FreeBSD 3.5
- FreeBSD 4.0
- FreeBSD 4.1.1
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.3
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- NetBSD
- NetBSD
- NetBSD on X86
- NetBSD 1.0
- NetBSD 1.1
- NetBSD 1.2.1
- NetBSD 1.2
- NetBSD 1.3.1
- NetBSD 1.3.2
- NetBSD 1.3.3
- NetBSD 1.3
- NetBSD 1.4.1
- NetBSD 1.4.2
- NetBSD 1.4.3
- NetBSD 1.4
- NetBSD 1.5
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2001-0710, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2001-0710 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References