A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/16375 | vdb entry |
http://securitytracker.com/id?1015542 | vdb entry |
http://secunia.com/advisories/18609 | third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24337 | vdb entry |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:07.pf.asc | patch vendor advisory |
http://www.osvdb.org/22732 | vdb entry |
http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.103&r2=1.104 | |
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-004.txt.asc | vendor advisory |