![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.61702 |
Categoría: | FreeBSD Local Security Checks |
Título: | FreeBSD Security Advisory (FreeBSD-SA-08:10.nd6.asc) |
Resumen: | The remote host is missing an update to the system; as announced in the referenced advisory FreeBSD-SA-08:10.nd6.asc |
Descripción: | Summary: The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-08:10.nd6.asc Vulnerability Insight: IPv6 nodes use the Neighbor Discovery protocol to determine the link-layer address of other nodes, find routers, and maintain reachability information. The Neighbor Discovery protocol uses Neighbor Solicitation (ICMPv6 type 135) to query target nodes for their link-layer addresses. IPv6 routers may allow on-link IPv6 nodes to create and update the router's neighbor cache and forwarding information. A malicious IPv6 node sharing a common router but on a different physical segment from another node may be able to spoof Neighbor Discovery messages, allowing it to update router information for the victim node. Solution: Upgrade your system to the appropriate stable release or security branch dated after the correction date. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-2476 BugTraq ID: 31529 http://www.securityfocus.com/bid/31529 CERT/CC vulnerability note: VU#472363 http://www.kb.cert.org/vuls/id/472363 FreeBSD Security Advisory: FreeBSD-SA-08:10 http://security.freebsd.org/advisories/FreeBSD-SA-08:10.nd6.asc https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2008-09-036&viewMode=view NETBSD Security Advisory: NetBSD-SA2008-013 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-013.txt.asc OpenBSD Security Advisory: [4.2] 015: SECURITY FIX: October 2, 2008 http://www.openbsd.org/errata42.html#015_ndp OpenBSD Security Advisory: [4.3] 006: SECURITY FIX: October 2, 2008 http://www.openbsd.org/errata43.html#006_ndp https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5670 http://securitytracker.com/id?1020968 http://www.securitytracker.com/id?1021109 http://www.securitytracker.com/id?1021132 http://secunia.com/advisories/32112 http://secunia.com/advisories/32116 http://secunia.com/advisories/32117 http://secunia.com/advisories/32133 http://secunia.com/advisories/32406 http://www.vupen.com/english/advisories/2008/2750 http://www.vupen.com/english/advisories/2008/2751 http://www.vupen.com/english/advisories/2008/2752 http://www.vupen.com/english/advisories/2009/0633 XForce ISS Database: multiple-vendors-ndp-dos(45601) https://exchange.xforce.ibmcloud.com/vulnerabilities/45601 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |