The ipfw firewall in FreeBSD 6.0-RELEASE allows remote attackers to cause a denial of service (firewall crash) via ICMP IP fragments that match a reset, reject or unreach action, which leads to an access of an uninitialized pointer.
References
Link Resource
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:04.ipfw.asc Broken Link
http://secunia.com/advisories/18378 Broken Link Patch Vendor Advisory
http://securitytracker.com/id?1015477 Broken Link Third Party Advisory VDB Entry
http://www.osvdb.org/22319 Broken Link
http://www.securityfocus.com/bid/16209 Broken Link Patch Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/24073 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: freebsd

Published: 2006-01-11T21:00:00

Updated: 2017-07-19T15:57:01

Reserved: 2005-12-30T00:00:00


Link: CVE-2006-0054

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2006-01-11T21:03:00.000

Modified: 2024-02-13T17:43:40.800


Link: CVE-2006-0054

JSON object: View

cve-icon Redhat Information

No data.

CWE