Vulnerability Details : CVE-2018-6922
One of the data structures that holds TCP segments in all versions of FreeBSD prior to 11.2-RELEASE-p1, 11.1-RELEASE-p12, and 10.4-RELEASE-p10 uses an inefficient algorithm to reassemble the data. This causes the CPU time spent on segment processing to grow linearly with the number of segments in the reassembly queue. An attacker who has the ability to send TCP traffic to a victim system can degrade the victim system's network performance and/or consume excessive CPU by exploiting the inefficiency of TCP reassembly handling, with relatively small bandwidth cost.
Products affected by CVE-2018-6922
- cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p7:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p9:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p7:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p11:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:10.4:p8:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.1:p9:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-6922
0.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-6922
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2018-6922
-
The product does not properly control the allocation and maintenance of a limited resource.Assigned by:
- nvd@nist.gov (Primary)
- secteam@freebsd.org (Secondary)
References for CVE-2018-6922
-
http://www.securitytracker.com/id/1041425
FreeBSD Kernel TCP Reassembly Algorithm Lets Remote Users Consume Excessive CPU Resources on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Oracle Critical Patch Update - January 2019Patch
-
https://security.netapp.com/advisory/ntap-20180815-0002/
CVE-2018-6922 FreeBSD Denial of Service (DoS) Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
http://www.securityfocus.com/bid/105058
FreeBSD TCP Reassembly CVE-2018-6922 Denial Of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:08.tcp.asc
Patch;Vendor Advisory
Jump to