Vulnerability Name: | CVE-2020-25577 (CCN-198975) | ||||||||||||
Assigned: | 2020-12-01 | ||||||||||||
Published: | 2020-12-01 | ||||||||||||
Updated: | 2021-06-03 | ||||||||||||
Summary: | In FreeBSD 12.2-STABLE before r368250, 11.4-STABLE before r368253, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 rtsold(8) does not verify that the RDNSS option does not extend past the end of the received packet before processing its contents. While the kernel currently ignores such malformed packets, it passes them to userspace programs. Any programs expecting the kernel to do validation may be vulnerable to an overflow. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-25577 Source: XF Type: UNKNOWN freebsd-cve202025577-bo(198975) Source: MISC Type: Vendor Advisory https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210423-0001/ Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-20:32.rtsold Multiple vulnerabilities in rtsold Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-25577 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |