Vulnerability CVE-2019-5599


Published: 2019-07-02

Description:
In FreeBSD 12.0-STABLE before r349197 and 12.0-RELEASE before 12.0-RELEASE-p6, a bug in the non-default RACK TCP stack can allow an attacker to cause several linked lists to grow unbounded and cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Linux / FreeBSD TCP-Based Denial Of Service
Jonathan Looney
19.06.2019

Type:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Freebsd -> Freebsd 

 References:
http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html
http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html
http://www.openwall.com/lists/oss-security/2019/06/17/5
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193
https://seclists.org/bugtraq/2019/Jun/27
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:08.rack.asc
https://security.netapp.com/advisory/ntap-20190625-0004/
https://support.f5.com/csp/article/K75521003
https://www.kb.cert.org/vuls/id/905115

Copyright 2024, cxsecurity.com

 

Back to Top