FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Freebsd | Freebsd | 3.0 (including) | 3.0 (including) |
| Freebsd | Freebsd | 3.1 (including) | 3.1 (including) |
| Freebsd | Freebsd | 3.2 (including) | 3.2 (including) |
| Freebsd | Freebsd | 3.3 (including) | 3.3 (including) |
| Freebsd | Freebsd | 3.4 (including) | 3.4 (including) |
| Freebsd | Freebsd | 3.5 (including) | 3.5 (including) |
| Freebsd | Freebsd | 4.0 (including) | 4.0 (including) |
| Freebsd | Freebsd | 5.0-alpha (including) | 5.0-alpha (including) |
| Netbsd | Netbsd | 1.4 (including) | 1.4 (including) |
| Netbsd | Netbsd | 1.4.1 (including) | 1.4.1 (including) |
| Netbsd | Netbsd | 1.4.2 (including) | 1.4.2 (including) |
| Openbsd | Openbsd | 2.5 (including) | 2.5 (including) |
| Openbsd | Openbsd | 2.6 (including) | 2.6 (including) |
| Openbsd | Openbsd | 2.7 (including) | 2.7 (including) |