The vulnerability affects versions 9.3, 10.1 and 10.2, the default configurations on later versions of the open source OS. It can be exploited by a specially crafted ICMPv6 packet, which will cause a kernel panic. A SCTP socket need not be open to exploit the flaw, Positive Technologies in the U.K. says. The vulnerability is exploitable remotely and without authentication, the open-source OS says. Users are advised to disable IPv6 addressing, block ICMP v6 or IPv6 traffic, or disable SCTp stack support in the kernel if possible.
Source: https://threatpost.com/freebsd-patches-kernel-panic-vulnerability/116001/

