First published: Wed Nov 28 2018(Updated: )
In FreeBSD before 11.2-STABLE(r340268) and 11.2-RELEASE-p5, due to incorrectly accounting for padding on 64-bit platforms, a buffer underwrite could occur when constructing an ICMP reply packet when using a non-standard value for the net.inet.icmp.quotelen sysctl.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <11.2 | |
FreeBSD Kernel | =11.2-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17156 is classified as a medium severity vulnerability.
To fix CVE-2018-17156, update FreeBSD to version 11.2-STABLE(r340268) or 11.2-RELEASE-p5 or later.
CVE-2018-17156 affects FreeBSD systems, specifically versions prior to 11.2-STABLE(r340268) and 11.2-RELEASE-p5.
CVE-2018-17156 could facilitate a buffered underwrite attack when constructing ICMP reply packets.
Yes, CVE-2018-17156 may be exploitable remotely through ICMP packets.