2023-08-02 14:00:39 +00:00

32 lines
882 B
JSON

{
"id": "CVE-2023-3107",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2023-08-01T23:15:30.580",
"lastModified": "2023-08-02T13:30:39.550",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "secteam@freebsd.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-23:06.ipv6.asc",
"source": "secteam@freebsd.org"
}
]
}