In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/152934/FreeBSD-Security-Advisory-FreeBSD-SA-19-06.pf.html - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/108395 - | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-19:06.pf.asc - Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20190611-0001/ - | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - | |
References | () https://www.synacktiv.com/posts/systems/icmp-reachable.html - Third Party Advisory |
Information
Published : 2019-05-15 16:29
Updated : 2024-11-21 04:45
NVD link : CVE-2019-5598
Mitre link : CVE-2019-5598
CVE.ORG link : CVE-2019-5598
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-20
Improper Input Validation