The vulnerability allows a remote attacker to perform a denial of service (DoS) attack. The vulnerability exists due to insufficient validation of user-supplied input in the IPv6 implementation. A remote attacker can send a specially crafted IPv6 packet and perform a denial of service (DoS) attack.