CVE-2019-5599

In FreeBSD 12.0-STABLE before r349197 and 12.0-RELEASE before 12.0-RELEASE-p6, a bug in the non-default RACK TCP stack can allow an attacker to cause several linked lists to grow unbounded and cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service.
References
Link Resource
http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2019/06/17/5 Mailing List Third Party Advisory
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md Mitigation Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/27 Mailing List Mitigation Patch Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:08.rack.asc Mitigation Vendor Advisory
https://security.netapp.com/advisory/ntap-20190625-0004/ Third Party Advisory
https://support.f5.com/csp/article/K75521003 Third Party Advisory
https://www.kb.cert.org/vuls/id/905115 Third Party Advisory US Government Resource
http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2019/06/17/5 Mailing List Third Party Advisory
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md Mitigation Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/27 Mailing List Mitigation Patch Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:08.rack.asc Mitigation Vendor Advisory
https://security.netapp.com/advisory/ntap-20190625-0004/ Third Party Advisory
https://support.f5.com/csp/article/K75521003 Third Party Advisory
https://www.kb.cert.org/vuls/id/905115 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*

History

21 Nov 2024, 04:45

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2019/06/17/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/06/17/5 - Mailing List, Third Party Advisory
References () https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md - Mitigation, Third Party Advisory () https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md - Mitigation, Third Party Advisory
References () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 - Third Party Advisory () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 - Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jun/27 - Mailing List, Mitigation, Patch, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/27 - Mailing List, Mitigation, Patch, Third Party Advisory
References () https://security.FreeBSD.org/advisories/FreeBSD-SA-19:08.rack.asc - Mitigation, Vendor Advisory () https://security.FreeBSD.org/advisories/FreeBSD-SA-19:08.rack.asc - Mitigation, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20190625-0004/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20190625-0004/ - Third Party Advisory
References () https://support.f5.com/csp/article/K75521003 - Third Party Advisory () https://support.f5.com/csp/article/K75521003 - Third Party Advisory
References () https://www.kb.cert.org/vuls/id/905115 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/905115 - Third Party Advisory, US Government Resource

Information

Published : 2019-07-02 21:15

Updated : 2024-11-21 04:45


NVD link : CVE-2019-5599

Mitre link : CVE-2019-5599

CVE.ORG link : CVE-2019-5599


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-770

Allocation of Resources Without Limits or Throttling