summaryrefslogtreecommitdiff
path: root/security/vuxml/vuln.xml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2006-02-14 10:28:53 +0000
committerRemko Lodder <remko@FreeBSD.org>2006-02-14 10:28:53 +0000
commit424491da55ece222d4480595f18aa9343f31a0b7 (patch)
tree59b960bdaa5d43873d4e2253cf5394c4409a4b47 /security/vuxml/vuln.xml
parentFix for updated Mason API, see: (diff)
Document pf -- IP fragment handling panic, FreeBSD SA 06.07
Notes
Notes: svn path=/head/; revision=155993
Diffstat (limited to 'security/vuxml/vuln.xml')
-rw-r--r--security/vuxml/vuln.xml41
1 files changed, 41 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ba236d8945c8..00c697263882 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,47 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="52ba7713-9d42-11da-8c1d-000e0c2e438a">
+ <topic>pf -- IP fragment handling panic</topic>
+ <affects>
+ <system>
+ <name>FreeBSD</name>
+ <range><gt>6.0</gt><lt>6.0_4</lt></range>
+ <range><gt>5.4</gt><lt>5.4_10</lt></range>
+ <range><gt>5.3</gt><lt>5.3_25</lt></range>
+ </system>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Problem description:</p>
+ <p>A logic bug in pf's IP fragment cache may result in a packet
+ fragment being inserted twice, violating a kernel
+ invariant.</p>
+ <p>Impact:</p>
+ <p>By sending carefully crafted sequence of IP packet fragments,
+ a remote attacker can cause a system running pf with a ruleset
+ containing a 'scrub fragment crop' or 'scrub fragment
+ drop-ovl' rule to crash.</p>
+ <p>Workaround:</p>
+ <p>Do not use 'scrub fragment crop' or 'scrub fragment drop-ovl'
+ rules on systems running pf. In most cases, such rules can be
+ replaced by 'scrub fragment reassemble' rules; see the
+ pf.conf(5) manual page for more details.</p>
+
+ <p>Systems which do not use pf, or use pf but do not use the aforementioned
+ rules, are not affected by this issue.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2006-0381</cvename>
+ <freebsdsa>SA-06:07</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2006-01-25</discovery>
+ <entry>2006-02-14</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7a4f2aca-9d40-11da-8c1d-000e0c2e438a">
<topic>FreeBSD -- Local kernel memory disclosure</topic>
<affects>