Vulnerability Name: | CVE-2020-25577 (CCN-198975) |
Assigned: | 2020-12-01 |
Published: | 2020-12-01 |
Updated: | 2021-06-03 |
Summary: | In FreeBSD 12.2-STABLE before r368250, 11.4-STABLE before r368253, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 rtsold(8) does not verify that the RDNSS option does not extend past the end of the received packet before processing its contents. While the kernel currently ignores such malformed packets, it passes them to userspace programs. Any programs expecting the kernel to do validation may be vulnerable to an overflow.
|
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-120
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2020-25577
Source: XF Type: UNKNOWN freebsd-cve202025577-bo(198975)
Source: MISC Type: Vendor Advisory https://security.FreeBSD.org/advisories/FreeBSD-SA-20:32.rtsold.asc
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210423-0001/
Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-20:32.rtsold Multiple vulnerabilities in rtsold
Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-25577
|
Vulnerable Configuration: | Configuration 1: cpe:/o:freebsd:freebsd:11.4:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p2:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p3:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p7:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p9:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p8:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.2:-:*:*:*:*:*:* Configuration CCN 1: cpe:/o:freebsd:freebsd:12.1:release:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:stable:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:release:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |