Lucene search

K
cve[email protected]CVE-2020-7469
HistoryJun 04, 2021 - 12:15 p.m.

CVE-2020-7469

2021-06-0412:15:07
CWE-416
web.nvd.nist.gov
38
8
cve-2020-7469
freebsd
use-after-free
network stack
icmpv6
security vulnerability
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.8%

In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.

Affected configurations

NVD
Node
freebsdfreebsdMatch11.4-
OR
freebsdfreebsdMatch11.4beta1
OR
freebsdfreebsdMatch11.4p1
OR
freebsdfreebsdMatch11.4p2
OR
freebsdfreebsdMatch11.4p3
OR
freebsdfreebsdMatch11.4p4
OR
freebsdfreebsdMatch11.4rc1
OR
freebsdfreebsdMatch11.4rc2
OR
freebsdfreebsdMatch12.1-
OR
freebsdfreebsdMatch12.1p10
OR
freebsdfreebsdMatch12.1p2
OR
freebsdfreebsdMatch12.1p3
OR
freebsdfreebsdMatch12.1p4
OR
freebsdfreebsdMatch12.1p5
OR
freebsdfreebsdMatch12.1p6
OR
freebsdfreebsdMatch12.1p7
OR
freebsdfreebsdMatch12.1p8
OR
freebsdfreebsdMatch12.1p9
OR
freebsdfreebsdMatch12.2-
Node
netappclustered_data_ontapMatch-

CNA Affected

[
  {
    "product": "FreeBSD",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "FreeBSD 12.2-RELEASE before p1, 12.1-RELEASE before p11, 11.4-RELEASE before p5"
      }
    ]
  }
]

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.8%