Vulnerability Name: | CVE-2019-5599 (CCN-162666) | ||||||||||||
Assigned: | 2019-06-17 | ||||||||||||
Published: | 2019-06-17 | ||||||||||||
Updated: | 2020-08-24 | ||||||||||||
Summary: | In FreeBSD 12.0-STABLE before r349197 and 12.0-RELEASE before 12.0-RELEASE-p6, a bug in the non-default RACK TCP stack can allow an attacker to cause several linked lists to grow unbounded and cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-770 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-5599 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html Source: CCN Type: US-CERT VU#905115 Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues Source: XF Type: UNKNOWN freebsd-cve20195599-dos(162666) Source: CCN Type: NFLX-2019-001 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service vulnerabilities Source: MISC Type: Mitigation, Third Party Advisory https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md Source: MISC Type: Third Party Advisory https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193 Source: BUGTRAQ Type: Mailing List, Mitigation, Patch, Third Party Advisory 20190624 FreeBSD Security Advisory FreeBSD-SA-19:08.rack Source: CCN Type: oss-sec Mailing List, Mon, 17 Jun 2019 10:33:38 -0700 (PDT) Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues Source: FREEBSD Type: Mitigation, Vendor Advisory FreeBSD-SA-19:08 Source: MISC Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190625-0004/ Source: MISC Type: Third Party Advisory https://support.f5.com/csp/article/K75521003 Source: CCN Type: FreeBSD Project Web site FreeBSD Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#905115 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |