The ipfw firewall in FreeBSD 6.0-RELEASE allows remote attackers to cause a denial of service (firewall crash) via ICMP IP fragments that match a reset, reject or unreach action, which leads to an access of an uninitialized pointer.
References
Link | Resource |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc | Broken Link |
http://secunia.com/advisories/18378 | Broken Link Patch Vendor Advisory |
http://securitytracker.com/id?1015477 | Broken Link Third Party Advisory VDB Entry |
http://www.osvdb.org/22319 | Broken Link |
http://www.securityfocus.com/bid/16209 | Broken Link Patch Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 | Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: freebsd
Published: 2006-01-11T21:00:00
Updated: 2017-07-19T15:57:01
Reserved: 2005-12-30T00:00:00
Link: CVE-2006-0054
JSON object: View
NVD Information
Status : Analyzed
Published: 2006-01-11T21:03:00.000
Modified: 2024-02-13T17:43:40.800
Link: CVE-2006-0054
JSON object: View
Redhat Information
No data.
CWE