All the vulnerabilites related to IETF - draft-ietf-v6ops-ra-guard-08
cve-2021-27862
Vulnerability from cvelistv5
Published
2022-09-27 18:40
Modified
2024-09-16 20:43
Severity ?
EPSS score ?
Summary
L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with an invalid length during Ethernet to Wifi frame translation
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | IEEE | 802.2 |
Version: 802.2h-1997 < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:33:15.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { "tags": [ "x_transferred" ], "url": "https://standards.ieee.org/ieee/802.2/1048/" }, { "tags": [ "x_transferred" ], "url": "https://kb.cert.org/vuls/id/855201" }, { "tags": [ "x_transferred" ], "url": "https://blog.champtar.fr/VLAN0_LLC_SNAP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "802.2", "vendor": "IEEE", "versions": [ { "lessThanOrEqual": "802.2h-1997", "status": "affected", "version": "802.2h-1997", "versionType": "custom" } ] }, { "product": "draft-ietf-v6ops-ra-guard-08", "vendor": "IETF", "versions": [ { "lessThanOrEqual": "08", "status": "affected", "version": "08", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Etienne Champetier (@champtar) \u003cchampetier.etienne@gmail.com\u003e" } ], "datePublic": "2022-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290: Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-12T00:00:00", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "url": "https://datatracker.ietf.org/doc/draft-ietf-v6ops-ra-guard/08/" }, { "url": "https://standards.ieee.org/ieee/802.2/1048/" }, { "url": "https://kb.cert.org/vuls/id/855201" }, { "url": "https://blog.champtar.fr/VLAN0_LLC_SNAP/" } ], "source": { "discovery": "EXTERNAL" }, "title": "L2 network filtering bypass using stacked VLAN0 and LLC/SNAP headers with an invalid length during Ethernet to Wifi frame translation" } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2021-27862", "datePublished": "2022-09-27T18:40:14.712076Z", "dateReserved": "2021-03-01T00:00:00", "dateUpdated": "2024-09-16T20:43:01.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }