Vulnerability Name: | CVE-2020-7469 (CCN-203079) |
Assigned: | 2020-12-01 |
Published: | 2020-12-01 |
Updated: | 2022-05-31 |
Summary: | In FreeBSD 12.2-STABLE before r367402, 11.4-STABLE before r368202, 12.2-RELEASE before p1, 12.1-RELEASE before p11 and 11.4-RELEASE before p5 the handler for a routing option caches a pointer into the packet buffer holding the ICMPv6 message. However, when processing subsequent options the packet buffer may be freed, rendering the cached pointer invalid. The network stack may later dereference the pointer, potentially triggering a use-after-free.
|
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): High |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Complete |
|
Vulnerability Type: | CWE-416
|
Vulnerability Consequences: | Denial of Service |
References: | Source: MITRE Type: CNA CVE-2020-7469
Source: XF Type: UNKNOWN freebsd-cve20207469-dos(203079)
Source: MISC Type: Vendor Advisory https://security.FreeBSD.org/advisories/FreeBSD-SA-20:31.icmp6.asc
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20210720-0001/
Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-20:31.icmp6 ICMPv6 use-after-free in error message handling
|
Vulnerable Configuration: | Configuration 1: cpe:/o:freebsd:freebsd:12.1:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:-:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:rc1:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p2:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p3:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:11.4:p4:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p10:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p7:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p8:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.1:p9:*:*:*:*:*:*OR cpe:/o:freebsd:freebsd:12.2:-:*:*:*:*:*:* Configuration 2: cpe:/a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |