FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freebsd | Freebsd | 3.0 (including) | 3.0 (including) |
Freebsd | Freebsd | 3.1 (including) | 3.1 (including) |
Freebsd | Freebsd | 3.2 (including) | 3.2 (including) |
Freebsd | Freebsd | 3.3 (including) | 3.3 (including) |
Freebsd | Freebsd | 3.4 (including) | 3.4 (including) |
Freebsd | Freebsd | 3.5 (including) | 3.5 (including) |
Freebsd | Freebsd | 4.0 (including) | 4.0 (including) |
Freebsd | Freebsd | 5.0-alpha (including) | 5.0-alpha (including) |
Netbsd | Netbsd | 1.4 (including) | 1.4 (including) |
Netbsd | Netbsd | 1.4.1 (including) | 1.4.1 (including) |
Netbsd | Netbsd | 1.4.2 (including) | 1.4.2 (including) |
Openbsd | Openbsd | 2.5 (including) | 2.5 (including) |
Openbsd | Openbsd | 2.6 (including) | 2.6 (including) |
Openbsd | Openbsd | 2.7 (including) | 2.7 (including) |