Описание
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 11.0 (включая)
Одно из
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:10.3:p19:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.0:p10:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.0221
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-416
CWE-20
Связанные уязвимости
CVSS3: 7.5
debian
почти 8 лет назад
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3 ...
CVSS3: 7.5
github
больше 3 лет назад
In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
EPSS
Процентиль: 84%
0.0221
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-416
CWE-20