![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.61702 |
Kategorie: | FreeBSD Local Security Checks |
Titel: | FreeBSD Security Advisory (FreeBSD-SA-08:10.nd6.asc) |
Zusammenfassung: | The remote host is missing an update to the system; as announced in the referenced advisory FreeBSD-SA-08:10.nd6.asc |
Beschreibung: | Summary: The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-08:10.nd6.asc Vulnerability Insight: IPv6 nodes use the Neighbor Discovery protocol to determine the link-layer address of other nodes, find routers, and maintain reachability information. The Neighbor Discovery protocol uses Neighbor Solicitation (ICMPv6 type 135) to query target nodes for their link-layer addresses. IPv6 routers may allow on-link IPv6 nodes to create and update the router's neighbor cache and forwarding information. A malicious IPv6 node sharing a common router but on a different physical segment from another node may be able to spoof Neighbor Discovery messages, allowing it to update router information for the victim node. Solution: Upgrade your system to the appropriate stable release or security branch dated after the correction date. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-2476 BugTraq ID: 31529 http://www.securityfocus.com/bid/31529 CERT/CC vulnerability note: VU#472363 http://www.kb.cert.org/vuls/id/472363 FreeBSD Security Advisory: FreeBSD-SA-08:10 http://security.freebsd.org/advisories/FreeBSD-SA-08:10.nd6.asc https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-036&viewMode=view NETBSD Security Advisory: NetBSD-SA2008-013 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-013.txt.asc OpenBSD Security Advisory: [4.2] 015: SECURITY FIX: October 2, 2008 http://www.openbsd.org/errata42.html#015_ndp OpenBSD Security Advisory: [4.3] 006: SECURITY FIX: October 2, 2008 http://www.openbsd.org/errata43.html#006_ndp https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5670 http://securitytracker.com/id?1020968 http://www.securitytracker.com/id?1021109 http://www.securitytracker.com/id?1021132 http://secunia.com/advisories/32112 http://secunia.com/advisories/32116 http://secunia.com/advisories/32117 http://secunia.com/advisories/32133 http://secunia.com/advisories/32406 http://www.vupen.com/english/advisories/2008/2750 http://www.vupen.com/english/advisories/2008/2751 http://www.vupen.com/english/advisories/2008/2752 http://www.vupen.com/english/advisories/2009/0633 XForce ISS Database: multiple-vendors-ndp-dos(45601) https://exchange.xforce.ibmcloud.com/vulnerabilities/45601 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |