Unrated severityNVD Advisory· Published Aug 11, 2009· Updated Apr 23, 2026
CVE-2009-0687
CVE-2009-0687
Description
The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.
Affected products
7- cpe:2.3:o:midnightbsd:midnightbsd:0.3-current:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patchnvdPatchVendor Advisory
- www.openbsd.org/errata43.htmlnvdPatchVendor Advisory
- www.openbsd.org/errata44.htmlnvdPatchVendor Advisory
- www.openbsd.org/errata45.htmlnvdPatchVendor Advisory
- www.vupen.com/english/advisories/2009/1015nvdPatchVendor Advisory
- ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-001.txt.ascnvdVendor Advisory
- www.helith.net/txt/multiple_vendor-PF_null_pointer_dereference.txtnvd
- www.osvdb.org/53608nvd
- www.securityfocus.com/archive/1/502634nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/49837nvd
- www.exploit-db.com/exploits/8406nvd
- www.exploit-db.com/exploits/8581nvd
News mentions
0No linked articles in our index yet.