A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-43794 A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.
Fixes

Solution

No solution given by the vendor.


Workaround

Users with IPv6 disabled on untrusted network interfaces are not affected. Such interfaces will have the IFDISABLED nd6 flag set in ifconfig(8). The kernel may be configured to drop all IPv6 fragments by setting the net.inet6.ip6.maxfrags sysctl to 0. Doing so will prevent the bug from being triggered, with the caveat that legitimate IPv6 fragments will be dropped. If the pf(4) firewall is enabled, and scrubbing and fragment reassembly is enabled on untrusted interfaces, the bug cannot be triggered. This is the default if pf(4) is enabled.

History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00125}

epss

{'score': 0.00163}


Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service. A set of carefully crafted ipv6 packets can trigger an integer overflow in the calculation of a fragment reassembled packet's payload length field. This allows an attacker to trigger a kernel panic, resulting in a denial of service.

Tue, 22 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: freebsd

Published:

Updated: 2025-07-09T13:45:34.790Z

Reserved: 2023-06-05T14:10:11.626Z

Link: CVE-2023-3107

cve-icon Vulnrichment

Updated: 2024-08-02T06:48:07.287Z

cve-icon NVD

Status : Modified

Published: 2023-08-01T23:15:30.580

Modified: 2025-07-09T14:15:26.207

Link: CVE-2023-3107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.