CVE-2006-0054

The ipfw firewall in FreeBSD 6.0-RELEASE allows remote attackers to cause a denial of service (firewall crash) via ICMP IP fragments that match a reset, reject or unreach action, which leads to an access of an uninitialized pointer.
References
Link Resource
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc Broken Link
http://secunia.com/advisories/18378 Broken Link Patch Vendor Advisory
http://securitytracker.com/id?1015477 Broken Link Third Party Advisory VDB Entry
http://www.osvdb.org/22319 Broken Link
http://www.securityfocus.com/bid/16209 Broken Link Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 Third Party Advisory VDB Entry
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc Broken Link
http://secunia.com/advisories/18378 Broken Link Patch Vendor Advisory
http://securitytracker.com/id?1015477 Broken Link Third Party Advisory VDB Entry
http://www.osvdb.org/22319 Broken Link
http://www.securityfocus.com/bid/16209 Broken Link Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:o:freebsd:freebsd:6.0:-:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc - Broken Link () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc - Broken Link
References () http://secunia.com/advisories/18378 - Broken Link, Patch, Vendor Advisory () http://secunia.com/advisories/18378 - Broken Link, Patch, Vendor Advisory
References () http://securitytracker.com/id?1015477 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1015477 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.osvdb.org/22319 - Broken Link () http://www.osvdb.org/22319 - Broken Link
References () http://www.securityfocus.com/bid/16209 - Broken Link, Patch, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/16209 - Broken Link, Patch, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 - Third Party Advisory, VDB Entry

13 Feb 2024, 17:43

Type Values Removed Values Added
References (BID) http://www.securityfocus.com/bid/16209 - Patch (BID) http://www.securityfocus.com/bid/16209 - Broken Link, Patch, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/18378 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/18378 - Broken Link, Patch, Vendor Advisory
References (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc - (FREEBSD) ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 - Third Party Advisory, VDB Entry
References (SECTRACK) http://securitytracker.com/id?1015477 - (SECTRACK) http://securitytracker.com/id?1015477 - Broken Link, Third Party Advisory, VDB Entry
References (OSVDB) http://www.osvdb.org/22319 - (OSVDB) http://www.osvdb.org/22319 - Broken Link
CPE cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.0:-:*:*:*:*:*:*
CWE NVD-CWE-Other CWE-824

Information

Published : 2006-01-11 21:03

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0054

Mitre link : CVE-2006-0054

CVE.ORG link : CVE-2006-0054


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-824

Access of Uninitialized Pointer