Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD TCP fragments memory corruptions
Published:01.05.2014
Source:
SecurityVulns ID:13691
Type:remote
Threat Level:
8/10
Description:Memory corruptions on fragmented packets ressembly.
Affected:FREEBSD : FreeBSD 8.4
 FREEBSD : FreeBSD 9.2
 FREEBSD : FreeBSD 10.0
CVE:CVE-2014-3000 (The TCP reassembly function in the inet module in FreeBSD 8.3 before p16, 8.4 before p9, 9.1 before p12, 9.2 before p5, and 10.0 before p2 allows remote attackers to cause a denial of service (undefined memory access and system crash) or possibly read system memory via multiple crafted packets, related to moving a reassemble queue entry to the segment list when the queue is full.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:08.tcp (01.05.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod