Vulnerability Details : CVE-2014-3955
routed in FreeBSD 8.4 through 10.1-RC2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RIP request from a source not on a directly connected network.
Vulnerability category: Denial of service
Products affected by CVE-2014-3955
- cpe:2.3:o:freebsd:freebsd:9.0:beta1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:beta2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:beta3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:prerelease:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:8.4:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.2:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.1:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:9.3:rc2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-3955
0.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-3955
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2014-3955
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-3955
-
http://secunia.com/advisories/61865
Sign in
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-14:21.routed.asc
Patch
-
http://www.securitytracker.com/id/1031099
FreeBSD routed(8) Processing Flaw Lets Remote Users Deny Service - SecurityTracker
Jump to