Product:

Router_advertisement_daemon

(Litech)
Repositories https://github.com/reubenhwk/radvd
#Vulnerabilities 6
Date Id Summary Products Score Patch Annotated
2014-04-27 CVE-2011-3602 Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files. Router_advertisement_daemon N/A
2015-01-15 CVE-2014-8153 The L3 agent in OpenStack Neutron 2014.2.x before 2014.2.2, when using radvd 2.0+, allows remote authenticated users to cause a denial of service (blocked router update processing) by creating eight routers and assigning an ipv6 non-provider subnet to each. Router_advertisement_daemon, Neutron N/A
2014-02-17 CVE-2011-3605 The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. Router_advertisement_daemon N/A
2014-02-17 CVE-2011-3604 The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors. Router_advertisement_daemon N/A
2014-04-27 CVE-2011-3603 The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact. Router_advertisement_daemon N/A
2014-02-17 CVE-2011-3601 Buffer overflow in the process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative value in a label_len value. Router_advertisement_daemon N/A