In FreeBSD before 11.0-STABLE, 11.0-RELEASE-p10, 10.3-STABLE, and 10.3-RELEASE-p19, ipfilter using "keep state" or "keep frags" options can cause a kernel panic when fed specially crafted packet fragments due to incorrect memory handling.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98089 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038369 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:04.ipfilter.asc | Vendor Advisory |
http://www.securityfocus.com/bid/98089 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038369 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:04.ipfilter.asc | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98089 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038369 - Third Party Advisory, VDB Entry | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-17:04.ipfilter.asc - Vendor Advisory |
Information
Published : 2018-04-10 13:29
Updated : 2024-11-21 03:21
NVD link : CVE-2017-1081
Mitre link : CVE-2017-1081
CVE.ORG link : CVE-2017-1081
JSON object : View
Products Affected
freebsd
- freebsd