Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-6923

Опубликовано: 04 сент. 2018
Источник: debian
EPSS Низкий

Описание

In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-10removedpackage

Примечания

  • https://www.freebsd.org/security/advisories/FreeBSD-SA-18:10.ip.asc

  • kfreebsd not covered by security support

EPSS

Процентиль: 82%
0.01821
Низкий

Связанные уязвимости

CVSS3: 7.5
nvd
больше 7 лет назад

In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.

CVSS3: 7.5
github
больше 3 лет назад

In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.

EPSS

Процентиль: 82%
0.01821
Низкий