Vulnerability Details : CVE-2019-5597
In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.
Vulnerability category: Input validation
Products affected by CVE-2019-5597
- cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-5597
6.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-5597
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST | |
9.1
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2019-5597
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-5597
-
https://security.netapp.com/advisory/ntap-20190611-0001/
May 2019 FreeBSD Vulnerabilities in NetApp Products | NetApp Product Security
-
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Oracle Critical Patch Update - July 2019
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:05.pf.asc
Patch;Vendor Advisory
-
https://www.synacktiv.com/ressources/Synacktiv_OpenBSD_PacketFilter_CVE-2019-5597_ipv6_frag.pdf
Exploit;Third Party Advisory
-
http://www.securityfocus.com/bid/108395
FreeBSD Multiple Security Bypass Vulnerabilities
-
http://packetstormsecurity.com/files/152933/FreeBSD-Security-Advisory-FreeBSD-SA-19-05.pf.html
FreeBSD Security Advisory - FreeBSD-SA-19:05.pf ≈ Packet StormThird Party Advisory;VDB Entry
Jump to