Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5597

Опубликовано: 15 мая 2019
Источник: debian
EPSS Низкий

Описание

In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kfreebsd-10removedpackage

Примечания

  • https://security.FreeBSD.org/advisories/FreeBSD-SA-19:05.pf.asc

  • kfreebsd not covered by security support

EPSS

Процентиль: 84%
0.02202
Низкий

Связанные уязвимости

CVSS3: 9.1
nvd
больше 6 лет назад

In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.

CVSS3: 9.1
github
больше 3 лет назад

In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.

CVSS3: 9.1
fstec
почти 7 лет назад

Уязвимость межсетевого экрана PF IPv6 операционных систем FreeBSD и Solaris, позволяющая нарушителю обойти существующие политики разграничения доступа или вызвать отказ в обслуживании

EPSS

Процентиль: 84%
0.02202
Низкий