FreeBSD : FreeBSD -- Denial of Service with IPv6 Router Advertisements (0bb55a18-600a-11e6-a6c3-14dae9d210b8)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The Neighbor Discover Protocol allows a local router to advertise a
suggested Current Hop Limit value of a link, which will replace
Current Hop Limit on an interface connected to the link on the FreeBSD
system. Impact : When the Current Hop Limit (similar to IPv4's TTL) is
small, IPv6 packets may get dropped before they reached their
destinations.

By sending specifically crafted Router Advertisement packets, an
attacker on the local network can cause the FreeBSD system to lose the
ability to communicate with another IPv6 node on a different network.

See also :

http://www.nessus.org/u?1c957415

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 92888 ()

Bugtraq ID: 74713

CVE ID: CVE-2015-2923

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now