Vulnerability Name:

CVE-2019-5599 (CCN-162666)

Assigned:2019-06-17
Published:2019-06-17
Updated:2020-08-24
Summary:In FreeBSD 12.0-STABLE before r349197 and 12.0-RELEASE before 12.0-RELEASE-p6, a bug in the non-default RACK TCP stack can allow an attacker to cause several linked lists to grow unbounded and cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-770
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-5599

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/153329/Linux-FreeBSD-TCP-Based-Denial-Of-Service.html

Source: MISC
Type: Third Party Advisory, VDB Entry
http://packetstormsecurity.com/files/153378/FreeBSD-Security-Advisory-FreeBSD-SA-19-08.rack.html

Source: CCN
Type: US-CERT VU#905115
Multiple TCP Selective Acknowledgement (SACK) and Maximum Segment Size (MSS) networking vulnerabilities may cause denial-of-service conditions in Linux and FreeBSD kernels

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues

Source: XF
Type: UNKNOWN
freebsd-cve20195599-dos(162666)

Source: CCN
Type: NFLX-2019-001
Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service vulnerabilities

Source: MISC
Type: Mitigation, Third Party Advisory
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md

Source: MISC
Type: Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44193

Source: BUGTRAQ
Type: Mailing List, Mitigation, Patch, Third Party Advisory
20190624 FreeBSD Security Advisory FreeBSD-SA-19:08.rack

Source: CCN
Type: oss-sec Mailing List, Mon, 17 Jun 2019 10:33:38 -0700 (PDT)
Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues

Source: FREEBSD
Type: Mitigation, Vendor Advisory
FreeBSD-SA-19:08

Source: MISC
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20190625-0004/

Source: MISC
Type: Third Party Advisory
https://support.f5.com/csp/article/K75521003

Source: CCN
Type: FreeBSD Project Web site
FreeBSD

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#905115

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:12.0:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.0:p4:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:12.0:p5:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:12.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 12.0 -
    freebsd freebsd 12.0 p1
    freebsd freebsd 12.0 p2
    freebsd freebsd 12.0 p3
    freebsd freebsd 12.0 p4
    freebsd freebsd 12.0 p5
    freebsd freebsd 12.0