5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
45.6%
Problem Description:
When an ICMPv6 error message is received, the FreeBSD ICMPv6 stack
may extract information from the message to hand to upper-layer
protocols. As a part of this operation, it may parse IPv6 header
options from a packet embedded in the ICMPv6 message.
The handler for a routing option caches a pointer into the packet
buffer holding the ICMPv6 message. However, when processing
subsequent options the packet buffer may be freed, rendering the
cached pointer invalid. The network stack may later dereference the
pointer, potentially triggering a use-after-free.
Impact:
A remote host may be able to trigger a read of freed kernel memory.
This may trigger a kernel panic if the address had been unmapped.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | freebsd-kernel | = 12.2 | UNKNOWN |
FreeBSD | any | noarch | freebsd-kernel | < 12.2_1 | UNKNOWN |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.001 Low
EPSS
Percentile
45.6%