In FreeBSD before 11.1-STABLE, 11.2-RELEASE-p2, 11.1-RELEASE-p13, ip fragment reassembly code is vulnerable to a denial of service due to excessive system resource consumption. This issue can allow a remote attacker who is able to send an arbitrary ip fragments to cause the machine to consume excessive resources.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105336 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041505 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:10.ip.asc | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/105336 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041505 | Third Party Advisory VDB Entry |
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:10.ip.asc | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105336 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041505 - Third Party Advisory, VDB Entry | |
References | () https://www.freebsd.org/security/advisories/FreeBSD-SA-18:10.ip.asc - Mitigation, Vendor Advisory |
Information
Published : 2018-09-04 18:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-6923
Mitre link : CVE-2018-6923
CVE.ORG link : CVE-2018-6923
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-400
Uncontrolled Resource Consumption