FreeBSD -- SCTP ICMPv6 error message vulnerability
A lack of proper input checks in the ICMPv6 processing
in the SCTP stack can lead to either a failed kernel assertion
or to a NULL pointer dereference. In either case, a kernel
panic will follow.
A remote, unauthenticated attacker can reliably trigger
a kernel panic in a vulnerable system running IPv6. Any
kernel compiled with both IPv6 and SCTP support is vulnerable.
There is no requirement to have an SCTP socket open.
IPv4 ICMP processing is not impacted by this vulnerability.
Copyright © 2003-2005 Jacques Vidrine and contributors.
Please see the source of this document for full copyright