First published: Wed Jan 11 2006(Updated: )
The ipfw firewall in FreeBSD 6.0-RELEASE allows remote attackers to cause a denial of service (firewall crash) via ICMP IP fragments that match a reset, reject or unreach action, which leads to an access of an uninitialized pointer.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.0 | |
FreeBSD Kernel | =6.0-release | |
FreeBSD Kernel | =6.0-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0054 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2006-0054, upgrade your FreeBSD system to a version that is not affected, such as 6.1 or later.
CVE-2006-0054 affects FreeBSD 6.0-RELEASE and 6.0-stable versions.
CVE-2006-0054 enables remote attackers to crash the ipfw firewall, causing a denial of service.
Yes, CVE-2006-0054 involves ICMP IP fragments that target specific actions like reset and reject.