First published: Tue Jun 11 2002(Updated: )
The SYN cache (syncache) and SYN cookie (syncookie) mechanism in FreeBSD 4.5 and earlier allows remote attackers to cause a denial of service (crash) (1) via a SYN packet that is accepted using syncookies that causes a null pointer to be referenced for the socket's TCP options, or (2) by killing and restarting a process that listens on the same socket, which does not properly clear the old inpcb pointer on restart.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.5-stable | |
FreeBSD Kernel | =4.5-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0518 has a high severity rating as it can lead to a denial of service by crashing the system.
To fix CVE-2002-0518, upgrade to a later version of FreeBSD that mitigates this vulnerability, ideally beyond 4.5.
CVE-2002-0518 affects users of FreeBSD versions 4.5 and earlier.
CVE-2002-0518 exploits the SYN cache and SYN cookie mechanisms in FreeBSD.
Effective mitigation of CVE-2002-0518 typically requires a software upgrade rather than mere configuration changes.