First published: Wed Jan 25 2006(Updated: )
A logic error in the IP fragment cache functionality in pf in FreeBSD 5.3, 5.4, and 6.0, and OpenBSD, when a 'scrub fragment crop' or 'scrub fragment drop-ovl' rule is being used, allows remote attackers to cause a denial of service (crash) via crafted packets that cause a packet fragment to be inserted twice.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =5.4-releng | |
FreeBSD FreeBSD | =5.3-release | |
FreeBSD FreeBSD | =5.3 | |
FreeBSD FreeBSD | =5.4-pre-release | |
FreeBSD FreeBSD | =6.0-release | |
FreeBSD FreeBSD | =5.4-release | |
FreeBSD FreeBSD | =6.0-stable | |
FreeBSD FreeBSD | =5.3-stable | |
FreeBSD FreeBSD | =5.3-releng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.