First published: Wed May 15 2019(Updated: )
In FreeBSD 11.3-PRERELEASE before r345378, 12.0-STABLE before r345377, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in pf does not check if the outer ICMP or ICMP6 packet has the same destination IP as the source IP of the inner protocol packet allowing a maliciously crafted ICMP/ICMP6 packet could bypass the packet filter rules and be passed to a host that would otherwise be unavailable.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =11.2 | |
FreeBSD Kernel | =11.2-p2 | |
FreeBSD Kernel | =11.2-p3 | |
FreeBSD Kernel | =11.2-p4 | |
FreeBSD Kernel | =11.2-p5 | |
FreeBSD Kernel | =11.2-p6 | |
FreeBSD Kernel | =11.2-p7 | |
FreeBSD Kernel | =11.2-p9 | |
FreeBSD Kernel | =11.2-rc3 | |
FreeBSD Kernel | =12.0 | |
FreeBSD Kernel | =12.0-p1 | |
FreeBSD Kernel | =12.0-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5598 has been classified as a medium severity vulnerability due to the potential for unauthorized traffic manipulation.
CVE-2019-5598 affects FreeBSD versions 11.2 through 11.2-p9 and 12.0 before 12.0-p4.
To fix CVE-2019-5598, users should upgrade to the patched versions of FreeBSD, specifically 11.2-RELEASE-p10 or 12.0-RELEASE-p4 and above.
CVE-2019-5598 can potentially allow attackers to bypass packet filtering rules to manipulate traffic.
CVE-2019-5598 requires specific conditions to exploit, but can be executed by an attacker with knowledge of the network configuration.