First published: Fri Feb 27 2015(Updated: )
Integer overflow in FreeBSD before 8.4 p24, 9.x before 9.3 p10. 10.0 before p18, and 10.1 before p6 allows remote attackers to cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pfSense | =2.2.1 | |
Debian | =7.0 | |
FreeBSD Kernel | =8.4 | |
FreeBSD Kernel | =9.0 | |
FreeBSD Kernel | =9.1 | |
FreeBSD Kernel | =9.2 | |
FreeBSD Kernel | =9.3 | |
FreeBSD Kernel | =10.0 | |
FreeBSD Kernel | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1414 has a severity rating that indicates it can lead to a denial of service situation due to an integer overflow vulnerability.
To fix CVE-2015-1414, you should update your affected FreeBSD or pfSense installations to the latest patched versions.
FreeBSD versions before 8.4 p24, 9.x before 9.3 p10, 10.0 before p18, and 10.1 before p6 are all affected by CVE-2015-1414.
Yes, pfSense version 2.2.1 is affected by CVE-2015-1414 and requires an update to mitigate the issue.
CVE-2015-1414 can enable remote attackers to execute denial of service attacks by sending crafted IGMP packets.