{"vuid":"VU#370060","idnumber":"370060","name":"Solaris systems may crash in response to certain IPv6 packets","keywords":["Sun","Solaris","DoS","denial of service","IPv6 packet"],"overview":"Solaris 8 systems that accept IPv6 traffic may be subject to denial of service attacks from arbitrary remote attackers.","clean_desc":"Sun Microsystems has reported that systems running Solaris 8 may encounter a system panic in response to IPv6 packets with certain characteristics. Sun Alert Notification 55301 does not provide any information about the characteristics of the offending packet, so it may be possible to exploit this vulnerability with valid IPv6 traffic. Sun Microsystems reports that this vulnerability does not affect systems running Solaris 2.6, Solaris 7, and Solaris 9. For additional information, please read the Sun Alert Notification 55301, available at: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55301&zone_32=category%3Asecurity","impact":"This vulnerability allows arbitrary remote attackers to conduct denial of service attacks on affected systems.","resolution":"Apply a patch Sun Microsystems has provided the following patches to address this vulnerability: For the SPARC Platform, apply patch 108528\nFor the x86 Platform, apply patch 108529","workarounds":"Disable IPv6 As a general rule, the CERT/CC recommends that users and site administrators disable any services that are not required. For information on disabling IPv6 on affected Solaris systems, please read the \"Relief/Workaround\" section of Sun Alert Notification 55301.","sysaffected":"","thanks":"","author":"This document was written by Jeffrey P. Lanza and is based on information provided by Sun Microsystems.","public":["http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F55301&zone_32=category%3Asecurity","http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=108528&rev=21","http://sunsolve.sun.com/pub-cgi/findPatch.pl?patchId=108529&rev=21"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-07-23T15:41:01Z","publicdate":"2003-07-21T00:00:00Z","datefirstpublished":"2003-07-23T17:06:04Z","dateupdated":"2003-07-23T17:06:18Z","revision":8,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"5","cam_population":"20","cam_impact":"8","cam_easeofexploitation":"14","cam_attackeraccessrequired":"20","cam_scorecurrent":"25.2","cam_scorecurrentwidelyknown":"29.4","cam_scorecurrentwidelyknownexploited":"37.8","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.2,"vulnote":null}